Analysis
-
max time kernel
96s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240729-en -
resource tags
arch:x64arch:x86image:win10v2004-20240729-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 17:05
Behavioral task
behavioral1
Sample
78e4efdedd642b7927281c4ebc029c65_JaffaCakes118.dll
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
78e4efdedd642b7927281c4ebc029c65_JaffaCakes118.dll
-
Size
57KB
-
MD5
78e4efdedd642b7927281c4ebc029c65
-
SHA1
c246afb6d842a6bf221c55a9235b945bb8c04b3c
-
SHA256
5397c09d7d751eaccfae9a6547591f3311257dd3a5e23c0ee2c8cd148651c976
-
SHA512
082f4256458c0ecd3b56d7ad792fef5445ed07138a4867cfcc37d5cb4310b4aa326a543c55230d8f1d6caa776a18342d6b50ded9eefe142af79f49a242e51915
-
SSDEEP
768:9xBtKtqyLUGHLLtdGK1faczXWALnd3ZFFTLPEc9oSiFqcK+1JMKT/VoD8m3DQoDn:9YHl1facjLXjEMbcK+1JMBJZTn
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4448-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2224 wrote to memory of 4448 2224 rundll32.exe 83 PID 2224 wrote to memory of 4448 2224 rundll32.exe 83 PID 2224 wrote to memory of 4448 2224 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\78e4efdedd642b7927281c4ebc029c65_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\78e4efdedd642b7927281c4ebc029c65_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4448
-