Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 00:32
Behavioral task
behavioral1
Sample
82587c0c48384dee47f7ed01e5f930bd_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
General
-
Target
82587c0c48384dee47f7ed01e5f930bd_JaffaCakes118.dll
-
Size
34KB
-
MD5
82587c0c48384dee47f7ed01e5f930bd
-
SHA1
1d32d623841f29552dbf7fbd5deefc7645d48c82
-
SHA256
edb5a911ea4ea6b6b0f02fe4b410e25bdad8210ffb653b773803283695c3897b
-
SHA512
6c407b16b75c2a78fc4b16d2dc89f2002aee295e8cb481eadf2db1fea3f7223779ba09d8f2acad634a3ac3f3c122f0b3731edee8fd7b98b31756b7c3d3fa135f
-
SSDEEP
768:YJEp5e05ZVKjq11c1iLfQr3PcCo/kiXPYJnnXQ7pD:YJEu0nVKmcMbMq/tOiZ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3620-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4908 wrote to memory of 3620 4908 rundll32.exe 83 PID 4908 wrote to memory of 3620 4908 rundll32.exe 83 PID 4908 wrote to memory of 3620 4908 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82587c0c48384dee47f7ed01e5f930bd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82587c0c48384dee47f7ed01e5f930bd_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3620
-