Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 16:41
Behavioral task
behavioral1
Sample
8b228f464554d29860472a3c4557776d_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
8b228f464554d29860472a3c4557776d_JaffaCakes118.dll
-
Size
92KB
-
MD5
8b228f464554d29860472a3c4557776d
-
SHA1
316c20607ccebef0595cc11cee3641850f936025
-
SHA256
e46dd22495f29674a8ced278cb364afca8b5bb36b50c36b4ae0081fb96a70034
-
SHA512
bc546eef463bca087ca6593f529e09dd99e4671a204b55b90e63688f3a2e63f3eabd1e2eecebc1f472fe617d7b1f0bef83923edd390a1fe5884f49d8c403ea47
-
SSDEEP
1536:qWNTI2j7IGPmy5guIRp4RuvQQG6qHgxdPeuzH3kDJjDy7l1Zjt:qWNTHTey5HCOuPZdWuzH3IxD6tt
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4844-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 368 wrote to memory of 4844 368 rundll32.exe 84 PID 368 wrote to memory of 4844 368 rundll32.exe 84 PID 368 wrote to memory of 4844 368 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b228f464554d29860472a3c4557776d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b228f464554d29860472a3c4557776d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4844
-