Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 06:58
Static task
static1
Behavioral task
behavioral1
Sample
730508a25398bee304512d732fc958b6_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
730508a25398bee304512d732fc958b6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
730508a25398bee304512d732fc958b6_JaffaCakes118.dll
-
Size
196KB
-
MD5
730508a25398bee304512d732fc958b6
-
SHA1
681f2e4c482e36ee738654f78036577e75f4d8dd
-
SHA256
3e68359a8e2132ee5c502fd7412ea5058c05f49633329f5286b7d2066db5cb61
-
SHA512
7c3de82e744ad025cc16dd8f8f0c19e78521541f2a52955f366fda7d21468c086c8e1f548b307a27f10891c1b804ac6f3525cfbc40a7b9d8f90366887e06b9b2
-
SSDEEP
3072:FNA0GMHosm+8+3tmwHIAPb31hneCHFRXO0Dd0UjBiYS:FqcIsv4x4decXtIY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1908 wrote to memory of 484 1908 rundll32.exe 30 PID 1908 wrote to memory of 484 1908 rundll32.exe 30 PID 1908 wrote to memory of 484 1908 rundll32.exe 30 PID 1908 wrote to memory of 484 1908 rundll32.exe 30 PID 1908 wrote to memory of 484 1908 rundll32.exe 30 PID 1908 wrote to memory of 484 1908 rundll32.exe 30 PID 1908 wrote to memory of 484 1908 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\730508a25398bee304512d732fc958b6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\730508a25398bee304512d732fc958b6_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:484
-