Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 15:10
Behavioral task
behavioral1
Sample
701b804c6cefb2185f71f37cc36072c1_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
General
-
Target
701b804c6cefb2185f71f37cc36072c1_JaffaCakes118.dll
-
Size
67KB
-
MD5
701b804c6cefb2185f71f37cc36072c1
-
SHA1
2e42f33d0ce201cdf78d4e07190af3f83f2a0488
-
SHA256
00234f2850ed8447c5d2f604e75e969e9168ca59dc151f78d4095a45bae6232a
-
SHA512
bd15a8c6b80288f22036d3697d5f945bb2f63488446a72d827d235790e03c8a017cd654a4266b16a7554697f62ca89b64a327a6d0e5ca785e09ef813d5201e22
-
SSDEEP
1536:MhBRVgrExucM9WXYMCljJKfdjocIIl1px1FIUaNq1:cRRsrWXYL5JKJozIl1vEnN8
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2168 wrote to memory of 1648 2168 rundll32.exe 28 PID 2168 wrote to memory of 1648 2168 rundll32.exe 28 PID 2168 wrote to memory of 1648 2168 rundll32.exe 28 PID 2168 wrote to memory of 1648 2168 rundll32.exe 28 PID 2168 wrote to memory of 1648 2168 rundll32.exe 28 PID 2168 wrote to memory of 1648 2168 rundll32.exe 28 PID 2168 wrote to memory of 1648 2168 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\701b804c6cefb2185f71f37cc36072c1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\701b804c6cefb2185f71f37cc36072c1_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1648
-