Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 09:09
Behavioral task
behavioral1
Sample
a630f2b974658ed05211ae13998add4a_JaffaCakes118.dll
Resource
win7-20240705-en
3 signatures
150 seconds
General
-
Target
a630f2b974658ed05211ae13998add4a_JaffaCakes118.dll
-
Size
33KB
-
MD5
a630f2b974658ed05211ae13998add4a
-
SHA1
a4ae402889190ce702a0f7f7469b532df74b1945
-
SHA256
004f4645e2b4b7af1139a29fd630926b5d251fb9f4a076a677fbac47607f5001
-
SHA512
e0cff34a160c94fcb7a7a39ed02dd31666fe41d093bf8193a8fce1e360e4f9b46427ba52b2612f186f91b3378840636b686b1c8ab43cce301f507453d56247c6
-
SSDEEP
768:Rn1nW32AL4Tntz7mCuYkeCDMssGAojwzF+0w7e94aNV8ZnbcuyD7UEAp2:fnWDcTtz7uwG0zFn94Pnouy8EAp2
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1056-3-0x0000000010000000-0x0000000010018000-memory.dmp upx behavioral1/memory/1056-2-0x0000000010000000-0x0000000010018000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 648 wrote to memory of 1056 648 rundll32.exe 30 PID 648 wrote to memory of 1056 648 rundll32.exe 30 PID 648 wrote to memory of 1056 648 rundll32.exe 30 PID 648 wrote to memory of 1056 648 rundll32.exe 30 PID 648 wrote to memory of 1056 648 rundll32.exe 30 PID 648 wrote to memory of 1056 648 rundll32.exe 30 PID 648 wrote to memory of 1056 648 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a630f2b974658ed05211ae13998add4a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a630f2b974658ed05211ae13998add4a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1056
-