Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
10-12-2024 22:11
Behavioral task
behavioral1
Sample
deb3ed21304ee52407a2628acaac4a78_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
deb3ed21304ee52407a2628acaac4a78_JaffaCakes118.dll
-
Size
228KB
-
MD5
deb3ed21304ee52407a2628acaac4a78
-
SHA1
fe6efa7e67c276c361a85665e7b00c87d917008e
-
SHA256
59bbcf7eccde56f7d927edbe19cbb7ae9e0e11e19645a10ba6f78747a4f0454a
-
SHA512
c4bcf777b0bc6864c364d5aebcfa3e484cc5ae610508b5934a68c237f2b64392d3727976c0e5c2ed4175f39ff521a8b53d248dd8687a191a813088f67c9dccdb
-
SSDEEP
6144:d4zpMILQBM0hdQaJONNuXBmIUxiXlJLtm8yZBv0gtTcos4QVB6ohAizQ:uzpMILQO0hdQaJONNuXBmIUxiXlm8yLj
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 35004600450035003100460036003000320036004500360036004100450046000000 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2204 rundll32.exe 2204 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2204 rundll32.exe Token: SeTcbPrivilege 2204 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2204 2436 rundll32.exe 31 PID 2436 wrote to memory of 2204 2436 rundll32.exe 31 PID 2436 wrote to memory of 2204 2436 rundll32.exe 31 PID 2436 wrote to memory of 2204 2436 rundll32.exe 31 PID 2436 wrote to memory of 2204 2436 rundll32.exe 31 PID 2436 wrote to memory of 2204 2436 rundll32.exe 31 PID 2436 wrote to memory of 2204 2436 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\deb3ed21304ee52407a2628acaac4a78_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\deb3ed21304ee52407a2628acaac4a78_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204
-