Analysis
-
max time kernel
12s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 23:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
71c05ac89f9c8988585b272f354b42a8_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
General
-
Target
71c05ac89f9c8988585b272f354b42a8_JaffaCakes118.dll
-
Size
78KB
-
MD5
71c05ac89f9c8988585b272f354b42a8
-
SHA1
3e67c6719052af417916e78136e43c401985bcea
-
SHA256
3653f989c13a9974e1bf977c4f92a4f2bd49878fbe44452ebb07b894bb0de5ca
-
SHA512
557631cc834f6339e69d4b93948b2d4bf853edff52b0582351e62c41d5a7ac2af2d950e6365c3d5cc0dde093fa9be97dbf507b8bbc6be606d7c98a6627e39dee
-
SSDEEP
1536:Cac4x6cIfS5jLyZDVWFbn1mLvKQVXN1mZ9J3qQTRfntS+Vy:DNxif4fydVWFbkLSQp8KQFfwR
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2504 2548 rundll32.exe 29 PID 2548 wrote to memory of 2504 2548 rundll32.exe 29 PID 2548 wrote to memory of 2504 2548 rundll32.exe 29 PID 2548 wrote to memory of 2504 2548 rundll32.exe 29 PID 2548 wrote to memory of 2504 2548 rundll32.exe 29 PID 2548 wrote to memory of 2504 2548 rundll32.exe 29 PID 2548 wrote to memory of 2504 2548 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71c05ac89f9c8988585b272f354b42a8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71c05ac89f9c8988585b272f354b42a8_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2504
-