Analysis
-
max time kernel
134s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 08:35
Behavioral task
behavioral1
Sample
6af0d5ca931e2450ecd52066fcc4856c_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
6af0d5ca931e2450ecd52066fcc4856c_JaffaCakes118.dll
-
Size
55KB
-
MD5
6af0d5ca931e2450ecd52066fcc4856c
-
SHA1
114bfa3fd64581483037162765d43d9178ca59f9
-
SHA256
4442bfa5fb13a5fc7d96484b2b664501d86fa71d50ec6e0f2a13a6df8875469c
-
SHA512
5e14f9a8675f112985784cc9ec2df3a4d205ecf48c420ea03766ed8a64f93e7fbbe9e6020b94c42e5602d8ad15d78d101d42e2ea416f640ba41ec8c804b8438a
-
SSDEEP
768:h8WTpVT0X8zblJ2vegGQoRmx3cDEFt1MPzbcLvxcjBXBHq1KKoVq+Ai4f:RVn2xoRmxsQFt1GzbEcdX5q1KKoQN
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4336-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3484 wrote to memory of 4336 3484 rundll32.exe 83 PID 3484 wrote to memory of 4336 3484 rundll32.exe 83 PID 3484 wrote to memory of 4336 3484 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6af0d5ca931e2450ecd52066fcc4856c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6af0d5ca931e2450ecd52066fcc4856c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4336
-