Analysis
-
max time kernel
84s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 14:44
Behavioral task
behavioral1
Sample
b3e1ac5d7988d06c18d9f5512a3ad3a9_JaffaCakes118.dll
Resource
win7-20240705-en
3 signatures
150 seconds
General
-
Target
b3e1ac5d7988d06c18d9f5512a3ad3a9_JaffaCakes118.dll
-
Size
115KB
-
MD5
b3e1ac5d7988d06c18d9f5512a3ad3a9
-
SHA1
ac6d273f27e9e2d5a9df34dcc082d7d7e8c274f4
-
SHA256
a19cf425b3271ee65ae836b2a94235797bae7bc2fb7aa767914f26237a56d97b
-
SHA512
81351b7dd4437aa7859e406b93d636eb0c2eff671bd3e81f8933028c8a949ed1ddbbbc58f4dc02d404b465e8899c4433b28a717a418981d2774cb408a725088e
-
SSDEEP
3072:zu1XEHLYOiFFB4rSwGF8b7qpmt83ZuwJjV:zsEMHFArzGWb20txiB
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3756-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1852 wrote to memory of 3756 1852 rundll32.exe 84 PID 1852 wrote to memory of 3756 1852 rundll32.exe 84 PID 1852 wrote to memory of 3756 1852 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3e1ac5d7988d06c18d9f5512a3ad3a9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3e1ac5d7988d06c18d9f5512a3ad3a9_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3756
-