Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 13:41
Behavioral task
behavioral1
Sample
6fd03db26e93200e62d94051be7392b0_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
General
-
Target
6fd03db26e93200e62d94051be7392b0_JaffaCakes118.dll
-
Size
56KB
-
MD5
6fd03db26e93200e62d94051be7392b0
-
SHA1
87c5161cf2df47ffc2b5a99808df6e9d515b3584
-
SHA256
a8d6e65f85abbf9ee4510451370622984e93ad5fe02562e1c8703e7428383e00
-
SHA512
a31e4f3cb91002ff9b7d0075a7b4b275d62c913cdc5273b921a76d79021439e07c3044a9988a4e8644996b3db31f2fec0f0c82dab49a113d034b2d97af8c3c6f
-
SSDEEP
1536:1zExMwCGQ2j65BP+IccaAdIRrnzV2QbCSWzS1:1I+wCGv+55+IccaAdIRrnzVHWzS1
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2432 wrote to memory of 3052 2432 rundll32.exe 30 PID 2432 wrote to memory of 3052 2432 rundll32.exe 30 PID 2432 wrote to memory of 3052 2432 rundll32.exe 30 PID 2432 wrote to memory of 3052 2432 rundll32.exe 30 PID 2432 wrote to memory of 3052 2432 rundll32.exe 30 PID 2432 wrote to memory of 3052 2432 rundll32.exe 30 PID 2432 wrote to memory of 3052 2432 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6fd03db26e93200e62d94051be7392b0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6fd03db26e93200e62d94051be7392b0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3052
-