Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 13:19
Behavioral task
behavioral1
Sample
a6d0b203eff2af3436edc1f564b463e1_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
a6d0b203eff2af3436edc1f564b463e1_JaffaCakes118.dll
-
Size
58KB
-
MD5
a6d0b203eff2af3436edc1f564b463e1
-
SHA1
7ed0959cdfc1faf8266a0815e7cc5642d9f19ee1
-
SHA256
0740cc8b544bb3c1a8f122dd289d279810fbdceeb95d64173eb369dc1bd7bfef
-
SHA512
5d3a7360c28c50542684701e0446b6f31102374f0781ff979334a69b427e1460df0fdc1b7c35d51e5e8957a1017532bc16f8628441c4442eb4e5b001e361adde
-
SSDEEP
768:nbY4lGhd+dteKU1LJa8ur0Y7WqMn7T5j9/X1cZ14cVX5VYzvt6BxxigVz5I:EGegnuoUY3M7l9/X1GVVJVYzvt6h7Vzu
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4488-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 460 wrote to memory of 4488 460 rundll32.exe 84 PID 460 wrote to memory of 4488 460 rundll32.exe 84 PID 460 wrote to memory of 4488 460 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6d0b203eff2af3436edc1f564b463e1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6d0b203eff2af3436edc1f564b463e1_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4488
-