Analysis
-
max time kernel
91s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 16:02
Behavioral task
behavioral1
Sample
74bd4a3db7e16b6871b5c2a6e6bf055b_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
74bd4a3db7e16b6871b5c2a6e6bf055b_JaffaCakes118.dll
-
Size
72KB
-
MD5
74bd4a3db7e16b6871b5c2a6e6bf055b
-
SHA1
db7f2d99965553c6a12905f88cae928a6083bc7e
-
SHA256
12afb4bd92f0f78139bd596c588558f23f07e92fe7f59f78b9d3b4e4ba59ecae
-
SHA512
44cd5e2020cc85815d061e152606b9d9bd56ee9bc35ab4bd8026be09d3a59143b29e1956ca917230e2b969b75ef8d227e65e07ee0402e1924aa7abc335289fe5
-
SSDEEP
1536:VZIcCxRv3ZSSx028fiT678bUWBW6P+puxUQGrX4:r+mSxd8fe66UW46P+p0UVrX4
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4428-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2648 wrote to memory of 4428 2648 rundll32.exe 84 PID 2648 wrote to memory of 4428 2648 rundll32.exe 84 PID 2648 wrote to memory of 4428 2648 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74bd4a3db7e16b6871b5c2a6e6bf055b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\74bd4a3db7e16b6871b5c2a6e6bf055b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4428
-