Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 07:14
Behavioral task
behavioral1
Sample
951cd58f22ca8ee92bc06844e872f280_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
951cd58f22ca8ee92bc06844e872f280_JaffaCakes118.dll
-
Size
47KB
-
MD5
951cd58f22ca8ee92bc06844e872f280
-
SHA1
9c30368d53435a02d0d745092eb05ebf1cd67fd7
-
SHA256
f0c078e6618d9dc52b95dc7d01ae08c2e3532897786dbb6a5fae7d48d606f004
-
SHA512
c3493d4266881748f8349e77f7f3b19c4cb0f89d804b4613af3444e3e5ee6a7cea549b24910a69f56a327fb28388377daf35e329c6aa2e0b02be0ab950d16db0
-
SSDEEP
768:hM1opOjOOfwvhg2mR6jKOLO2XCqsoLlX8Dr0wErce15W939cNrI8hO5XvnICbxTj:anRCmR6u2XCULl6r0Jri9cNrI8Y5fnIs
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2328-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3188 wrote to memory of 2328 3188 rundll32.exe 84 PID 3188 wrote to memory of 2328 3188 rundll32.exe 84 PID 3188 wrote to memory of 2328 3188 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\951cd58f22ca8ee92bc06844e872f280_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\951cd58f22ca8ee92bc06844e872f280_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2328
-