Analysis
-
max time kernel
12s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
27/01/2025, 23:15
Behavioral task
behavioral1
Sample
JaffaCakes118_4493bd3e2bacc80225a33669c164bd78.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4493bd3e2bacc80225a33669c164bd78.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_4493bd3e2bacc80225a33669c164bd78.dll
-
Size
96KB
-
MD5
4493bd3e2bacc80225a33669c164bd78
-
SHA1
31339c046dda48da3b8c8a60466804c698f08de8
-
SHA256
ae890e427508e67278a214184e023e593b296d3c16e900f5d5c5a2a9a6ba92ce
-
SHA512
8127e9eef6ecdecd198565a0a24ac961ef40ce326aeb43321f44a0afc04e570b6c0ebb836ec0dc522be596e37a1586bea01e17eb56c7da225b0a59388ddcfe2c
-
SSDEEP
1536:CMX1/dT3o9fOTdsqUk4nm+UocrtAfcdqC46Tw37kgJ0DUpPx:XX1to9fOBqFTUoMtacdqf6Tw37kgaDUv
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Drivers\beep.sys rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2472 2448 rundll32.exe 29 PID 2448 wrote to memory of 2472 2448 rundll32.exe 29 PID 2448 wrote to memory of 2472 2448 rundll32.exe 29 PID 2448 wrote to memory of 2472 2448 rundll32.exe 29 PID 2448 wrote to memory of 2472 2448 rundll32.exe 29 PID 2448 wrote to memory of 2472 2448 rundll32.exe 29 PID 2448 wrote to memory of 2472 2448 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4493bd3e2bacc80225a33669c164bd78.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4493bd3e2bacc80225a33669c164bd78.dll,#12⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:2472
-