Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 04:09
Behavioral task
behavioral1
Sample
6a30c22cb1bef584ac2d94f75f91c44f_JaffaCakes118.dll
Resource
win7-20240705-en
3 signatures
150 seconds
General
-
Target
6a30c22cb1bef584ac2d94f75f91c44f_JaffaCakes118.dll
-
Size
27KB
-
MD5
6a30c22cb1bef584ac2d94f75f91c44f
-
SHA1
20d380021123a44d9cff6da4a87ebe9d9e82670b
-
SHA256
a6d5958504e873590fc4b12a81aad138e76563e0052db92992f8e6b483724ac6
-
SHA512
e558d0ce1c846e810df0e859900553e1bad85dcbbba7f08c9b87ed58410b57b0c570b1953a5aee3b2c6ded8913e559f6fa93de8df4c266f21d1b4bd79ac1e294
-
SSDEEP
384:IMq2rIfmAGo3Ur6EkdEqWYrnFe5v9a2wUrMx74lBhVyUpNiiDoKQcehtaCBw:pqRTG1r2dCYrnS9a2OxoyQiyitaC
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1248-0-0x0000000000CA0000-0x0000000000CB6000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1248 rundll32.exe 1248 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2768 wrote to memory of 1248 2768 rundll32.exe 84 PID 2768 wrote to memory of 1248 2768 rundll32.exe 84 PID 2768 wrote to memory of 1248 2768 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a30c22cb1bef584ac2d94f75f91c44f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a30c22cb1bef584ac2d94f75f91c44f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1248
-