Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 09:03
Behavioral task
behavioral1
Sample
a62c541e2350e56df8eb925cb0cfc238_JaffaCakes118.dll
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
General
-
Target
a62c541e2350e56df8eb925cb0cfc238_JaffaCakes118.dll
-
Size
93KB
-
MD5
a62c541e2350e56df8eb925cb0cfc238
-
SHA1
1b2dbcb6b25ed18c730efdf7936b8497576af0f8
-
SHA256
b6a416cdc0302ea463be46bbd608d63e01bcfd0b0e4c58b645c316a9ad76c884
-
SHA512
b3d6ce21e57aa9effd7e7d1c694160fe617f076167793c148d5f70c28d67b9d38c8280fb56dcd72718f5f856c7ef29e7326bcca4a41ed6829d333ea4949a1048
-
SSDEEP
1536:Cx3/K2rb4l/8V3rQIr7/lrRYygg6BJlepZbvu+Ea79Hq7dpsSkoZ9m:03/KeW8V3rQs/ld6g6GbGa7E7vVlZ9m
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1624-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1760 wrote to memory of 1624 1760 rundll32.exe 84 PID 1760 wrote to memory of 1624 1760 rundll32.exe 84 PID 1760 wrote to memory of 1624 1760 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a62c541e2350e56df8eb925cb0cfc238_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a62c541e2350e56df8eb925cb0cfc238_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1624
-