Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 01:38
Behavioral task
behavioral1
Sample
76940ee5bbd5455dc2fe43582c9e9f13_JaffaCakes118.dll
Resource
win7-20240729-en
windows7-x64
2 signatures
150 seconds
General
-
Target
76940ee5bbd5455dc2fe43582c9e9f13_JaffaCakes118.dll
-
Size
94KB
-
MD5
76940ee5bbd5455dc2fe43582c9e9f13
-
SHA1
0ce8c3b4e8eec83ba80a7bde9480be57b03670d7
-
SHA256
4a1f2451b60a3dd0cb27e52d5d2693980f0b1da596536996d36614a96f307591
-
SHA512
12f7c0c5832ab6d104838212b8821c935066b8eda945312da657b35be1a872c356c29b58e152901aaffff6633aa555b51bd219fd0d7cd9486903e5ba37a94513
-
SSDEEP
1536:TpoZectu35iLnGlfahbfLaY6b+feoDlLMs5Y7p:TpoZP8ijIfaBfLaYLeiMDp
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2448 wrote to memory of 400 2448 rundll32.exe 29 PID 2448 wrote to memory of 400 2448 rundll32.exe 29 PID 2448 wrote to memory of 400 2448 rundll32.exe 29 PID 2448 wrote to memory of 400 2448 rundll32.exe 29 PID 2448 wrote to memory of 400 2448 rundll32.exe 29 PID 2448 wrote to memory of 400 2448 rundll32.exe 29 PID 2448 wrote to memory of 400 2448 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76940ee5bbd5455dc2fe43582c9e9f13_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76940ee5bbd5455dc2fe43582c9e9f13_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:400
-