Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 07:05
Behavioral task
behavioral1
Sample
a5d5bc428041a5234d5cdeae30264804_JaffaCakes118.dll
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
a5d5bc428041a5234d5cdeae30264804_JaffaCakes118.dll
-
Size
54KB
-
MD5
a5d5bc428041a5234d5cdeae30264804
-
SHA1
7613a568f5286974ffb2d5bbe4693ea460dc4f24
-
SHA256
d55cd693c63e8ae1115e28d5af58e61ec576f93e0359def9529f1cc1f2aaef80
-
SHA512
4280ec7a21419339761bc0289b0516d5dab9be541cab2026893abedd6dbcbabd127964cf9def48647beeaa29571739c3eff6a9241008ac600e158e920d69d607
-
SSDEEP
768:Gx4m7JNSll3dTG+1hL8GJPGs980IfYUIiWkrB+W7BwKBTnQppEAZ7:Bm1NGJVGG4GJPGj2ssGBjIpvZ7
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2340-0-0x0000000010000000-0x0000000010013000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2340 2352 rundll32.exe 85 PID 2352 wrote to memory of 2340 2352 rundll32.exe 85 PID 2352 wrote to memory of 2340 2352 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5d5bc428041a5234d5cdeae30264804_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5d5bc428041a5234d5cdeae30264804_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2340
-