Analysis
-
max time kernel
2s -
max time network
4s -
platform
windows10-2004_x64 -
resource
win10v2004-20240729-en -
resource tags
arch:x64arch:x86image:win10v2004-20240729-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 02:33
Behavioral task
behavioral1
Sample
76bc04fe8bae9ae2d73b4eb2524101c0_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
76bc04fe8bae9ae2d73b4eb2524101c0_JaffaCakes118.dll
-
Size
66KB
-
MD5
76bc04fe8bae9ae2d73b4eb2524101c0
-
SHA1
b5f03d160759a52a1b3a3c1faae79a6927d204c8
-
SHA256
0010f83546da12fa0bc8b098ce884aa309938b3a8182d256570eca4beda5cda3
-
SHA512
2b4022e0f9b3042aea9ac90323777564e539440376e4fdaea7343e1b2cc5349f4365311856677be2d38fe8eb64252d5faedd5b079fcf739d20ba413055b9f92b
-
SSDEEP
768:h8WTpVT0X8zbInz+U32IGXOzDkP9rMStXHebjsixMvEP/FI5NBmq1pGZysZQHnCV:RVe679Azjsi6vEPtYBp+YJdDcv
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3512-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2460 wrote to memory of 3512 2460 rundll32.exe 81 PID 2460 wrote to memory of 3512 2460 rundll32.exe 81 PID 2460 wrote to memory of 3512 2460 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76bc04fe8bae9ae2d73b4eb2524101c0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76bc04fe8bae9ae2d73b4eb2524101c0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3512
-