Analysis
-
max time kernel
141s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 11:47
Behavioral task
behavioral1
Sample
b781b5b89f9d193716055a846e7335d9_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
b781b5b89f9d193716055a846e7335d9_JaffaCakes118.dll
-
Size
68KB
-
MD5
b781b5b89f9d193716055a846e7335d9
-
SHA1
e9a44ec6a01523e8eb44a771c71c1cf5fdf344d0
-
SHA256
1d4ee62c3ae1058c970c49872cbd4dc8affe2a14a87b8fd5fec7ccaf6422138b
-
SHA512
ace87c482b586248852ac1fe420375f059f75344cab096a82ccaaa76809710b56cca3512c00352fad3fee570cbf45a1cf3641bb2dab84382a0950df7f7bf49f0
-
SSDEEP
1536:Bm1NGJVGereiugC5Z++oFZk48y4TdRYdgn1AOHcBvi7yvret:kX0VXrNy4+oFZkviguOKq7H
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4060-0-0x0000000010000000-0x0000000010013000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1560 wrote to memory of 4060 1560 rundll32.exe 84 PID 1560 wrote to memory of 4060 1560 rundll32.exe 84 PID 1560 wrote to memory of 4060 1560 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b781b5b89f9d193716055a846e7335d9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b781b5b89f9d193716055a846e7335d9_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4060
-