Analysis
-
max time kernel
139s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 22:56
Behavioral task
behavioral1
Sample
83e1821ba2234d5c35705e318a34a695_JaffaCakes118.dll
Resource
win7-20240708-en
2 signatures
150 seconds
General
-
Target
83e1821ba2234d5c35705e318a34a695_JaffaCakes118.dll
-
Size
55KB
-
MD5
83e1821ba2234d5c35705e318a34a695
-
SHA1
af1219d26a1e3086f289aa141d8f29213b85161e
-
SHA256
98d9cd2a4bf465b4042a85a3239bb769023c504ea7b0069c9d4b5a87c3ffbf43
-
SHA512
b2c8feb751f17a365833c6062d37a5a9365a0f84e5de988f002e2ec1ab66fe261646b81c5ce10a480f80ff2746c7bdc1481e08416613cdcc57592f28a11963ab
-
SSDEEP
1536:jZIcCxRWeItDuCGP4/0tQZLq6y92BYponz9JCHK6aQ:x+weItDDGP4/1L72yHz9b6aQ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3568-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1392 wrote to memory of 3568 1392 rundll32.exe 84 PID 1392 wrote to memory of 3568 1392 rundll32.exe 84 PID 1392 wrote to memory of 3568 1392 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\83e1821ba2234d5c35705e318a34a695_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\83e1821ba2234d5c35705e318a34a695_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3568
-