Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 22:11
Behavioral task
behavioral1
Sample
deb3ed21304ee52407a2628acaac4a78_JaffaCakes118.dll
Resource
win7-20240729-en
General
-
Target
deb3ed21304ee52407a2628acaac4a78_JaffaCakes118.dll
-
Size
228KB
-
MD5
deb3ed21304ee52407a2628acaac4a78
-
SHA1
fe6efa7e67c276c361a85665e7b00c87d917008e
-
SHA256
59bbcf7eccde56f7d927edbe19cbb7ae9e0e11e19645a10ba6f78747a4f0454a
-
SHA512
c4bcf777b0bc6864c364d5aebcfa3e484cc5ae610508b5934a68c237f2b64392d3727976c0e5c2ed4175f39ff521a8b53d248dd8687a191a813088f67c9dccdb
-
SSDEEP
6144:d4zpMILQBM0hdQaJONNuXBmIUxiXlJLtm8yZBv0gtTcos4QVB6ohAizQ:uzpMILQO0hdQaJONNuXBmIUxiXlm8yLj
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\CLASSES\FAST rundll32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\FAST\CLSID = 42003800410039003700410034003200310038003300370033003500360036000000 rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3668 rundll32.exe 3668 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3668 rundll32.exe Token: SeTcbPrivilege 3668 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3116 wrote to memory of 3668 3116 rundll32.exe 82 PID 3116 wrote to memory of 3668 3116 rundll32.exe 82 PID 3116 wrote to memory of 3668 3116 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\deb3ed21304ee52407a2628acaac4a78_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\deb3ed21304ee52407a2628acaac4a78_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3668
-