Analysis
-
max time kernel
141s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 18:19
Behavioral task
behavioral1
Sample
ac116d773b56cd9e19724eb47e31de82_JaffaCakes118.dll
Resource
win7-20240729-en
3 signatures
150 seconds
General
-
Target
ac116d773b56cd9e19724eb47e31de82_JaffaCakes118.dll
-
Size
99KB
-
MD5
ac116d773b56cd9e19724eb47e31de82
-
SHA1
86d53dcf2ed629c1d5e029c2a90bf7315cc908a6
-
SHA256
9a45b4893dd20991f071cfd21f8c0d1ad46b76f47b5be4c41f2e6ae56e795603
-
SHA512
bc60eb982c6a06ea031132e0f75b9f238d944b7b277ba53b2c5749fcaf1d71d365e7d9f80b97773303fa72dcb62626b99e81ac2c82abe1c521728bc7f22eba39
-
SSDEEP
1536:7rOUbmJ/ZS8DDfPVCMF7OBcDTQZ7TQ+g7YtfucLe04jlWX:FbmhoODfPV37OBcDsTk7YYcC04Jw
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3352-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3556 wrote to memory of 3352 3556 rundll32.exe 84 PID 3556 wrote to memory of 3352 3556 rundll32.exe 84 PID 3556 wrote to memory of 3352 3556 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac116d773b56cd9e19724eb47e31de82_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ac116d773b56cd9e19724eb47e31de82_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3352
-