Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 17:41
Behavioral task
behavioral1
Sample
b8872da06abef25801d92ac1162f3c48_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
b8872da06abef25801d92ac1162f3c48_JaffaCakes118.dll
-
Size
70KB
-
MD5
b8872da06abef25801d92ac1162f3c48
-
SHA1
cb375f929c6bdfa51eff5df4ddad8e433ed2a94e
-
SHA256
14db36642636f2c2fb39b759ebe8369c08b9ef6332ba47ad93727429a46ec0ae
-
SHA512
4f91adf5eaa38ff6e73768166e633bc23243d13e3d409be56502fb9650d668de0f3e5bfc95daa58c3fcdd9ceeeddbe9092c2ee53505ef25bddbba6f504903f5d
-
SSDEEP
1536:jZIcCxRO40vctthUOydaxBcCnyoRh88grwDGyIhO9dwz2gp:x+EZvc+OMOcCnyoz88grwKxO9iz2u
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/428-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4916 wrote to memory of 428 4916 rundll32.exe 84 PID 4916 wrote to memory of 428 4916 rundll32.exe 84 PID 4916 wrote to memory of 428 4916 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b8872da06abef25801d92ac1162f3c48_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b8872da06abef25801d92ac1162f3c48_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:428
-