Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 10:48
Behavioral task
behavioral1
Sample
b757fabb302e14a30e761f844d8a9fff_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
b757fabb302e14a30e761f844d8a9fff_JaffaCakes118.dll
-
Size
81KB
-
MD5
b757fabb302e14a30e761f844d8a9fff
-
SHA1
e31c764938535d83264d5c10d394241ccf097b5f
-
SHA256
114add4ffb06a6384e9d67ce9dcdd541832af39bb24fdf2b775009f93457ee3f
-
SHA512
9a9b64c9179f32f58713113883f2fa3e69604a638e082b06ccbd70f884498eb5f401c61c589948934fe1c83d9774145e8df9b5a87917d92ac51063efadb77b95
-
SSDEEP
1536:1zExMwCGQ2j+IhaZLalbiuuBA/srhdPfGPKLyy8bb4+9ISLSbTtY6SFFMQ5J7++U:1I+wCGvtUAlbiDBA/ahdfGiLylP1bLEP
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2360-2-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/2360-3-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/2360-1-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2360 2644 rundll32.exe 30 PID 2644 wrote to memory of 2360 2644 rundll32.exe 30 PID 2644 wrote to memory of 2360 2644 rundll32.exe 30 PID 2644 wrote to memory of 2360 2644 rundll32.exe 30 PID 2644 wrote to memory of 2360 2644 rundll32.exe 30 PID 2644 wrote to memory of 2360 2644 rundll32.exe 30 PID 2644 wrote to memory of 2360 2644 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b757fabb302e14a30e761f844d8a9fff_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b757fabb302e14a30e761f844d8a9fff_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2360
-