Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 19:31
Behavioral task
behavioral1
Sample
b8dd35b70cf00b55fffbd29290b35c64_JaffaCakes118.dll
Resource
win7-20240705-en
3 signatures
150 seconds
General
-
Target
b8dd35b70cf00b55fffbd29290b35c64_JaffaCakes118.dll
-
Size
68KB
-
MD5
b8dd35b70cf00b55fffbd29290b35c64
-
SHA1
a316b86b58f94a508cecb5224240a28cab9f0258
-
SHA256
3eabec1adb3b4a51062329ad09f51bf0c025ce98c10ad3ae183e32cc8a1a60e9
-
SHA512
91adc3cd524cc24b6fd13b84201029ac639087473d0c68b5db9114de63576702a418a73c9e154df2969f64e081c7a97a750742775ea3740ecb956389e0ef26c1
-
SSDEEP
1536:agF0eiyUcbwpYC9Rewn/HuXyn8vXYhaaCzRVLx5bI0CaN:t2yF2/HznCohapzRVx5b1
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/284-2-0x0000000010000000-0x0000000010011000-memory.dmp upx behavioral1/memory/284-1-0x0000000010000000-0x0000000010011000-memory.dmp upx behavioral1/memory/284-0-0x0000000010000000-0x0000000010011000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1544 wrote to memory of 284 1544 rundll32.exe 31 PID 1544 wrote to memory of 284 1544 rundll32.exe 31 PID 1544 wrote to memory of 284 1544 rundll32.exe 31 PID 1544 wrote to memory of 284 1544 rundll32.exe 31 PID 1544 wrote to memory of 284 1544 rundll32.exe 31 PID 1544 wrote to memory of 284 1544 rundll32.exe 31 PID 1544 wrote to memory of 284 1544 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b8dd35b70cf00b55fffbd29290b35c64_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b8dd35b70cf00b55fffbd29290b35c64_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:284
-