Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 11:56
Behavioral task
behavioral1
Sample
85f5fd81c9f9f7f625afb5fd5972dc51_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
General
-
Target
85f5fd81c9f9f7f625afb5fd5972dc51_JaffaCakes118.dll
-
Size
69KB
-
MD5
85f5fd81c9f9f7f625afb5fd5972dc51
-
SHA1
f31ffe45f2136c139e0ce5f09e68cf6d4afb49d7
-
SHA256
1ae8f9dc996906e6464e9eb026ee61b7211bde19433f12af9b8b864a0de8714a
-
SHA512
cd8e8ba60d707b6371745f65ffed288d21e4a6cfb407aebeff54bb17868e374fb368569d79329fa314bb31953f8a36548d92d627701f8c3827ff16c3c3a083b2
-
SSDEEP
1536:yl3E0TOl6iHM7B8GdtDWP6VuhDduF8p1fMqwt7quwN2jJ:E396TMukDW6Vqwm1KwN2jJ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1340-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4480 wrote to memory of 1340 4480 rundll32.exe 84 PID 4480 wrote to memory of 1340 4480 rundll32.exe 84 PID 4480 wrote to memory of 1340 4480 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85f5fd81c9f9f7f625afb5fd5972dc51_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\85f5fd81c9f9f7f625afb5fd5972dc51_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1340
-