Analysis
-
max time kernel
23s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
09/08/2024, 21:28
Behavioral task
behavioral1
Sample
839ba14ac35add9733b91840ae9c75f8_JaffaCakes118.dll
Resource
win7-20240729-en
3 signatures
150 seconds
General
-
Target
839ba14ac35add9733b91840ae9c75f8_JaffaCakes118.dll
-
Size
37KB
-
MD5
839ba14ac35add9733b91840ae9c75f8
-
SHA1
0754b9c857f56aeddbcdfd0891a39076ba00bf94
-
SHA256
5e4898fe0af775b4daa21c174dbc383682623fd4ae26d195a000e76835a2fc07
-
SHA512
2129e3a6d31594c78fe6fa9e3cbf1c6f3bc5d722ac65bdcc3a403a7a2ec83c132fed5d615f092745c563c99035a7d1a7a98a9499b2480d839eac95369032620c
-
SSDEEP
384:CSuEK6jhixpY8HpWY91Yxr+gMUMdbiB5kPAXobvbAgXKdJbEfc:CSuokLrQDy8Mpifk5bvnX2E
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2124-0-0x0000000010000000-0x000000001000B000-memory.dmp upx behavioral1/memory/2124-1-0x0000000010000000-0x000000001000B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2124 2420 rundll32.exe 29 PID 2420 wrote to memory of 2124 2420 rundll32.exe 29 PID 2420 wrote to memory of 2124 2420 rundll32.exe 29 PID 2420 wrote to memory of 2124 2420 rundll32.exe 29 PID 2420 wrote to memory of 2124 2420 rundll32.exe 29 PID 2420 wrote to memory of 2124 2420 rundll32.exe 29 PID 2420 wrote to memory of 2124 2420 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\839ba14ac35add9733b91840ae9c75f8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\839ba14ac35add9733b91840ae9c75f8_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2124
-