Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 06:46
Behavioral task
behavioral1
Sample
7740b2b46ef2a7f4e64560351867dcfc_JaffaCakes118.dll
Resource
win7-20240729-en
windows7-x64
3 signatures
150 seconds
General
-
Target
7740b2b46ef2a7f4e64560351867dcfc_JaffaCakes118.dll
-
Size
97KB
-
MD5
7740b2b46ef2a7f4e64560351867dcfc
-
SHA1
a9f1382d5b9d4f351ba960cd9dad75cc7de93f20
-
SHA256
692926a5cd2f2e8bd1db3f2eb3aa3916d1081a58e09d8e3c93b5a198efdcb3e1
-
SHA512
010c089ce50ae4c6c7ed4ab426d0864a274bd18d791b0774c132eef76f2f37137927977a0c0c4f066cdd572da1b2548fe10a1ec32e7c628cdb6cdf696691dbd2
-
SSDEEP
1536:kqKlQnkeUs8C9DtpLwYWAN/0MjKkVguKcNGrSL+flRK87Tjb5ceMIRO:k5g8C/Hx/0MTVgBc6SuXK87WeMIO
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2368-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 404 wrote to memory of 2368 404 rundll32.exe 84 PID 404 wrote to memory of 2368 404 rundll32.exe 84 PID 404 wrote to memory of 2368 404 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7740b2b46ef2a7f4e64560351867dcfc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7740b2b46ef2a7f4e64560351867dcfc_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2368
-