Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02/01/2025, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6730c02c0ed0592d662a08fa87aef24d.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6730c02c0ed0592d662a08fa87aef24d.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6730c02c0ed0592d662a08fa87aef24d.dll
-
Size
218KB
-
MD5
6730c02c0ed0592d662a08fa87aef24d
-
SHA1
644b15d1dde9e6cfcf66cd57143604587f014d1f
-
SHA256
7f9dde1f115cde459c0643ac2d9aa7c740ad3892463844cd2f3a35075251706b
-
SHA512
1dc4b71ce9336ed86aa9c84622f3fd501e111b46605cb09a7c6600a042bd6692afebf8255eb875dee9eeb182389e43fb0589b613217321c701c8410c0fc97bfa
-
SSDEEP
6144:vOO1k4nDWgRAkPHXHYZfeGhFs3k6wV/bkBZ6Y82xspLZ8/lY:vOOfR3PHoZWyFsQV/YBZ182epmNY
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Blocklisted process makes network request 3 IoCs
flow pid Process 5 2028 rundll32.exe 7 2028 rundll32.exe 9 2028 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2028 2708 rundll32.exe 30 PID 2708 wrote to memory of 2028 2708 rundll32.exe 30 PID 2708 wrote to memory of 2028 2708 rundll32.exe 30 PID 2708 wrote to memory of 2028 2708 rundll32.exe 30 PID 2708 wrote to memory of 2028 2708 rundll32.exe 30 PID 2708 wrote to memory of 2028 2708 rundll32.exe 30 PID 2708 wrote to memory of 2028 2708 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6730c02c0ed0592d662a08fa87aef24d.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6730c02c0ed0592d662a08fa87aef24d.dll,#12⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2028
-