Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 11:19
Behavioral task
behavioral1
Sample
8e8a26f76ed2a3c39448245ca68b075d_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
8e8a26f76ed2a3c39448245ca68b075d_JaffaCakes118.dll
-
Size
93KB
-
MD5
8e8a26f76ed2a3c39448245ca68b075d
-
SHA1
50fc3170348ba7671dcb908eaae7a22b520ac59d
-
SHA256
531fc57ede31772e32e2f086203a9f6c60a33a0b48522999829c64c5041e3054
-
SHA512
aef8538afc1c9e6fdcc321587c72f8c7dc802be1a847540f4bbd31975b7cc4197a244cea9c81f9247bcf2b9dfa609f1c36760037c099e7ddc18da55b59e768b4
-
SSDEEP
1536:/xLK2OReR3CHh5txDbNo/lk8RiYgVDpzitHRJs6:ZVOReRyHTtxDFZVBiu6
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1776-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4248 wrote to memory of 1776 4248 rundll32.exe 84 PID 4248 wrote to memory of 1776 4248 rundll32.exe 84 PID 4248 wrote to memory of 1776 4248 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e8a26f76ed2a3c39448245ca68b075d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8e8a26f76ed2a3c39448245ca68b075d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1776
-