Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 09:28
Behavioral task
behavioral1
Sample
73795599c3d19e0e9ca93dcf994a1224_JaffaCakes118.dll
Resource
win7-20240708-en
2 signatures
150 seconds
General
-
Target
73795599c3d19e0e9ca93dcf994a1224_JaffaCakes118.dll
-
Size
69KB
-
MD5
73795599c3d19e0e9ca93dcf994a1224
-
SHA1
de60ca9952b576893b5979307e5b3241863e3de8
-
SHA256
0307146a773a3727b961eb87aacf9cf7841c3b344d79d481afc3585e93540f7e
-
SHA512
437f46f08f280db155ee6e72e4b3a44ac87b0d8c91f0f614ac119b5006ca13104c3bf39a71117b21bde00038e62c00cb75672f9efa7c49713dce683a223f5fc3
-
SSDEEP
1536:evyyjxDhiWW++6QauuhbRuWXMFFhCnVrcdEd+1eThg:9KewQxuhlmFSVIde+1ii
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2360-0-0x0000000010000000-0x000000001000C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3916 wrote to memory of 2360 3916 rundll32.exe 86 PID 3916 wrote to memory of 2360 3916 rundll32.exe 86 PID 3916 wrote to memory of 2360 3916 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73795599c3d19e0e9ca93dcf994a1224_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73795599c3d19e0e9ca93dcf994a1224_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2360
-