Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 17:32
Behavioral task
behavioral1
Sample
940f5264bf8e0c1812cf1e99c8e8b9c1_JaffaCakes118.dll
Resource
win7-20240705-en
2 signatures
150 seconds
General
-
Target
940f5264bf8e0c1812cf1e99c8e8b9c1_JaffaCakes118.dll
-
Size
100KB
-
MD5
940f5264bf8e0c1812cf1e99c8e8b9c1
-
SHA1
07eec93d1f84555b8908e7152668fe53ed4cabea
-
SHA256
8a27691de0a36e53de86d901faac54d9570719c6808a2bbfe980f36da38b60f9
-
SHA512
bc0d3c5160c09826aeb41546699ff633725bd655878e92c80ff70bcf470835a1df2e73826694fd5c15921ba65dda660d4b6385c89ea05efac199c5067493b227
-
SSDEEP
1536:Zn4Mi33LS7enDxBiQvcqPhdQqXFvgIjZ1JJ4WmcML5vd:Zfi3b8enD3bIqVvgSJ4W2l
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3544-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2000 wrote to memory of 3544 2000 rundll32.exe 85 PID 2000 wrote to memory of 3544 2000 rundll32.exe 85 PID 2000 wrote to memory of 3544 2000 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\940f5264bf8e0c1812cf1e99c8e8b9c1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\940f5264bf8e0c1812cf1e99c8e8b9c1_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3544
-