Analysis
-
max time kernel
130s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 15:15
Behavioral task
behavioral1
Sample
701f946c835842832ae51fa291e945d5_JaffaCakes118.dll
Resource
win7-20240704-en
2 signatures
150 seconds
General
-
Target
701f946c835842832ae51fa291e945d5_JaffaCakes118.dll
-
Size
104KB
-
MD5
701f946c835842832ae51fa291e945d5
-
SHA1
a77740d6b3f784106e0407d3cd2f6112c819e2d2
-
SHA256
90607cb8973d7d7860d955ae6cbdff854e4271cd453494e114dbce86f54c7274
-
SHA512
3f27a04fa63708fa5c1fd09903e9853a005c6631973cdc2354b00e49c47fd9c068341d10aaf18e622a163189b83762fe2e2ebf55ea209b599f57691bffd003a9
-
SSDEEP
1536:e8/mATyLDMEsXTzObvIIbxiAWf6wF7ZP2MWvGBWB5+wlxClRciVRm3:YwgIEcO7IIbHWf66AuBkPsvS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3388-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4816 wrote to memory of 3388 4816 rundll32.exe 84 PID 4816 wrote to memory of 3388 4816 rundll32.exe 84 PID 4816 wrote to memory of 3388 4816 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\701f946c835842832ae51fa291e945d5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\701f946c835842832ae51fa291e945d5_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3388
-