Analysis
-
max time kernel
137s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 21:50
Behavioral task
behavioral1
Sample
bd492103b09b21428364dc310c0d6dbd_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
3 signatures
150 seconds
General
-
Target
bd492103b09b21428364dc310c0d6dbd_JaffaCakes118.dll
-
Size
64KB
-
MD5
bd492103b09b21428364dc310c0d6dbd
-
SHA1
363269d5b286b1a29ad278d6cdccc9ed0f2fc74f
-
SHA256
8e18151622d0587420fc2b3f4378cd0679bbabfcc770ef4b78e5d7f28921ceb5
-
SHA512
5a3e610a35b1b903d7c097563090a75b3742a028234d67dc9a3c588289a33ba4a8e4e52e748a8648d9a55a07343b5d8f9ef87d56d6c1448f107669d7517a3cc0
-
SSDEEP
768:M2tWGdRJy5JSdJPy6cZXRDzpGAmAXSs7mkkr/wVLJTZR34gdCBOfG4w/iaWRVY+g:Mq/JmJSPKvvmAXHmhjKL5ZFPm/gRVNg
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4560-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2532 wrote to memory of 4560 2532 rundll32.exe 84 PID 2532 wrote to memory of 4560 2532 rundll32.exe 84 PID 2532 wrote to memory of 4560 2532 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd492103b09b21428364dc310c0d6dbd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd492103b09b21428364dc310c0d6dbd_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4560
-