Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 11:56
Behavioral task
behavioral1
Sample
6f78a4eaef04de3fdd9dfd75d2c5f122_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
3 signatures
150 seconds
General
-
Target
6f78a4eaef04de3fdd9dfd75d2c5f122_JaffaCakes118.dll
-
Size
63KB
-
MD5
6f78a4eaef04de3fdd9dfd75d2c5f122
-
SHA1
9d3b9143c77af3fd8982694e61de6ec7d5aa5d1f
-
SHA256
9bea37189b554a9ba15f955a68f1a8681d0ee6e67309bf12003139d3aa93fc5b
-
SHA512
40e8a9fd5d757cee4778f269717aeefe6750f6c3ea4a14d9480fc888ac6b8c09129d0b5eac5604fab5129eff8d0a8abd41e240153725d2cc3fa781c722feb915
-
SSDEEP
1536:VZIcCxRrhnf2OkZAPMmE0Bece8sIIADDA3B:r+xhnfv7Jt7IEDeB
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2264-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4644 wrote to memory of 2264 4644 rundll32.exe 84 PID 4644 wrote to memory of 2264 4644 rundll32.exe 84 PID 4644 wrote to memory of 2264 4644 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6f78a4eaef04de3fdd9dfd75d2c5f122_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6f78a4eaef04de3fdd9dfd75d2c5f122_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2264
-