Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 06:38
Behavioral task
behavioral1
Sample
8363888d04cc0ee5641101d33c1a861e_JaffaCakes118.dll
Resource
win7-20240708-en
2 signatures
150 seconds
General
-
Target
8363888d04cc0ee5641101d33c1a861e_JaffaCakes118.dll
-
Size
53KB
-
MD5
8363888d04cc0ee5641101d33c1a861e
-
SHA1
442212564f57a9d9709198201771796e9e79b432
-
SHA256
a89670629191f6dc28a17257468ab3a764ae164da1581e8c0dc569e89239cea3
-
SHA512
9c91c98125d15436c33a4878bdc9afdea1c6f9c008b83a406cbe6503aeb8e14b3b64686df0213e334be91b2f7464c0606895b32adc2733b63172181da9885405
-
SSDEEP
1536:V2bHHfmOQW11by2IZo3kz6q5C5C35JGPDW:WHJ8Zr0gvGrW
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/392-0-0x0000000010000000-0x000000001000A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4932 wrote to memory of 392 4932 rundll32.exe 83 PID 4932 wrote to memory of 392 4932 rundll32.exe 83 PID 4932 wrote to memory of 392 4932 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8363888d04cc0ee5641101d33c1a861e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8363888d04cc0ee5641101d33c1a861e_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:392
-