Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-12-2024 06:21
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_029b5c9057c5a75dd5822ac06e98ea9f6d046a362437399a64b539cbd33fa4f9.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_029b5c9057c5a75dd5822ac06e98ea9f6d046a362437399a64b539cbd33fa4f9.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_029b5c9057c5a75dd5822ac06e98ea9f6d046a362437399a64b539cbd33fa4f9.dll
-
Size
184KB
-
MD5
b6a5560470b4d30933bec6035d8def65
-
SHA1
184350e6a6b8225a7eac1755b74ffe1454ecca4a
-
SHA256
029b5c9057c5a75dd5822ac06e98ea9f6d046a362437399a64b539cbd33fa4f9
-
SHA512
85c435b981cfc1726b008c5c30436610064bc5037585b331ba62679fc6c48b1f0a0999f9b6b2cd0e0645d2a5beef9b37c787b556612e97fbb80c0d56ce5d2d87
-
SSDEEP
3072:slq7HGgyI8cCOfbaukgst+E7QN3a3CgRq:sQbjv8B4aukgoQa
Malware Config
Extracted
metasploit
windows/download_exec
http://fussion1.com:443/files/templates.jpg
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2520 wrote to memory of 1904 2520 rundll32.exe 30 PID 2520 wrote to memory of 1904 2520 rundll32.exe 30 PID 2520 wrote to memory of 1904 2520 rundll32.exe 30 PID 2520 wrote to memory of 1904 2520 rundll32.exe 30 PID 2520 wrote to memory of 1904 2520 rundll32.exe 30 PID 2520 wrote to memory of 1904 2520 rundll32.exe 30 PID 2520 wrote to memory of 1904 2520 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_029b5c9057c5a75dd5822ac06e98ea9f6d046a362437399a64b539cbd33fa4f9.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_029b5c9057c5a75dd5822ac06e98ea9f6d046a362437399a64b539cbd33fa4f9.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1904
-