Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 04:06
Behavioral task
behavioral1
Sample
a55226f00dba16ca7e7311f63d5e46fc_JaffaCakes118.dll
Resource
win7-20240705-en
3 signatures
150 seconds
General
-
Target
a55226f00dba16ca7e7311f63d5e46fc_JaffaCakes118.dll
-
Size
56KB
-
MD5
a55226f00dba16ca7e7311f63d5e46fc
-
SHA1
1c8e1fdd3d84747c915e6fd756c056ddfcb9331a
-
SHA256
26c0bc904957f93d7b4659db10920cd4b3bc14a3af8bbcccc0ab0665a1da9365
-
SHA512
5e3326333c11df2a046c4dd411a883e39531e7e098d6fc99ba61c216b193d9da187eaae6aaf6d82140bac29e75b2e32dc75ab7ddf199afe161a938d1670b04d8
-
SSDEEP
1536:MhBRVgrExucMtltKShUaFtUFyxZotk1qKcombIp:cRRsLltjOaDUAotk1qDDIp
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/548-3-0x0000000010000000-0x0000000010017000-memory.dmp upx behavioral1/memory/548-0-0x0000000010000000-0x0000000010017000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1672 wrote to memory of 548 1672 rundll32.exe 30 PID 1672 wrote to memory of 548 1672 rundll32.exe 30 PID 1672 wrote to memory of 548 1672 rundll32.exe 30 PID 1672 wrote to memory of 548 1672 rundll32.exe 30 PID 1672 wrote to memory of 548 1672 rundll32.exe 30 PID 1672 wrote to memory of 548 1672 rundll32.exe 30 PID 1672 wrote to memory of 548 1672 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a55226f00dba16ca7e7311f63d5e46fc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a55226f00dba16ca7e7311f63d5e46fc_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:548
-