Analysis
-
max time kernel
24s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 18:29
Behavioral task
behavioral1
Sample
7538b0e9a6af4cf2a3e417faec883f86_JaffaCakes118.dll
Resource
win7-20240704-en
2 signatures
150 seconds
General
-
Target
7538b0e9a6af4cf2a3e417faec883f86_JaffaCakes118.dll
-
Size
89KB
-
MD5
7538b0e9a6af4cf2a3e417faec883f86
-
SHA1
a3eb94363f818beabad53879b502889fb6221fa2
-
SHA256
0fbe639ecfd84e4df045b6e42654d89b7a1ca2956d66c6b33346e01d1c985e51
-
SHA512
fe49bbe30f21c78a27629693e9b80ef6a6b5b867289ec0a4a12a67587c9c2aed3d515b921732faca7f9587c96d1dcac8e28fca0b99d3cd5575ba1854b0d306fd
-
SSDEEP
1536:XpoZectu35iLnGlfahGyLsP0PxLeQTJKkxOO4n1KkKufQZyxR:XpoZP8ijIfasyLeOzZxYwkK1sR
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2972 2556 rundll32.exe 29 PID 2556 wrote to memory of 2972 2556 rundll32.exe 29 PID 2556 wrote to memory of 2972 2556 rundll32.exe 29 PID 2556 wrote to memory of 2972 2556 rundll32.exe 29 PID 2556 wrote to memory of 2972 2556 rundll32.exe 29 PID 2556 wrote to memory of 2972 2556 rundll32.exe 29 PID 2556 wrote to memory of 2972 2556 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7538b0e9a6af4cf2a3e417faec883f86_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7538b0e9a6af4cf2a3e417faec883f86_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2972
-