Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 03:35
Behavioral task
behavioral1
Sample
6a183afb1bc474b317c8a397dd5e38cf_JaffaCakes118.dll
Resource
win7-20240705-en
2 signatures
150 seconds
General
-
Target
6a183afb1bc474b317c8a397dd5e38cf_JaffaCakes118.dll
-
Size
68KB
-
MD5
6a183afb1bc474b317c8a397dd5e38cf
-
SHA1
1f5d3b1aecfb141882a8192af593d45952559ba1
-
SHA256
d3508255bfdb3a17720010a7763db31408891229511488d86b639af7d4b86fd7
-
SHA512
b575deaf93162d995d578e7ba0ac34cd09b1f927f95d66046aed5999ade6d76f664398db1ce15d238c8e24d9383560d1aee5b75d736ffb9534dc1b15717cd57d
-
SSDEEP
1536:EG/8y9+1SPbqyhpOPi24HW2cJOtSpQzhaw39PfV82SnVudQGoEt9:EGES1vOg8ezhn982aud1oEt9
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1644 2040 rundll32.exe 30 PID 2040 wrote to memory of 1644 2040 rundll32.exe 30 PID 2040 wrote to memory of 1644 2040 rundll32.exe 30 PID 2040 wrote to memory of 1644 2040 rundll32.exe 30 PID 2040 wrote to memory of 1644 2040 rundll32.exe 30 PID 2040 wrote to memory of 1644 2040 rundll32.exe 30 PID 2040 wrote to memory of 1644 2040 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a183afb1bc474b317c8a397dd5e38cf_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a183afb1bc474b317c8a397dd5e38cf_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1644
-