Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 18:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8720d0dc35b6fb6b53e064de60f81d5b_JaffaCakes118.dll
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
General
-
Target
8720d0dc35b6fb6b53e064de60f81d5b_JaffaCakes118.dll
-
Size
144KB
-
MD5
8720d0dc35b6fb6b53e064de60f81d5b
-
SHA1
145ebfaa84a54aa5a3e30557f6d216c6b766cf94
-
SHA256
8f089ddad146d29496f01491f3c7fbd12a8628fb4744202f731c45fbc76ce604
-
SHA512
bca3a30405d0f6e10819d8216efd67c4b92d75f0ae5ab6969e67de2481fe5757c61a6f8110fb6f34f583ce35ea9a45ecf0e3c897b75615ca7dda4610bfddc000
-
SSDEEP
1536:GkJEbW2g8Hjy6r42B4nc8LijHrlmyzDayNyNP5v9uQUBIItbPHpFr3:GhWAHLYLinl7z5SvMPqItbP
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2524-4-0x0000000000190000-0x000000000019E000-memory.dmp upx behavioral1/memory/2524-3-0x0000000000190000-0x000000000019E000-memory.dmp upx behavioral1/memory/2524-0-0x0000000000190000-0x000000000019E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2976 wrote to memory of 2524 2976 rundll32.exe 30 PID 2976 wrote to memory of 2524 2976 rundll32.exe 30 PID 2976 wrote to memory of 2524 2976 rundll32.exe 30 PID 2976 wrote to memory of 2524 2976 rundll32.exe 30 PID 2976 wrote to memory of 2524 2976 rundll32.exe 30 PID 2976 wrote to memory of 2524 2976 rundll32.exe 30 PID 2976 wrote to memory of 2524 2976 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8720d0dc35b6fb6b53e064de60f81d5b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8720d0dc35b6fb6b53e064de60f81d5b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2524
-