Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 22:04
Behavioral task
behavioral1
Sample
bd5471a6f6c8ff7c3ad5eb99d5810a73_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
bd5471a6f6c8ff7c3ad5eb99d5810a73_JaffaCakes118.dll
-
Size
67KB
-
MD5
bd5471a6f6c8ff7c3ad5eb99d5810a73
-
SHA1
d0788a823adb533b01cf754e1a543fb26d1922b6
-
SHA256
7f18e31acbdb0d174494f69888a2fd69021675cbca4a959fbd460d28fe2c4bb0
-
SHA512
7ae7abc4578a57564575efc32e9fde591337d757b11bf23100c27f052eef4ffabf9e0ef373ff64f8e8b42d8ec622da7dc415f0a3fbfb78abe8c9ccf22a90f13a
-
SSDEEP
1536:EGS89h9kFS2M9NPWaMBZePhg4M8NTNXJUJt4Mbyju:EG79YlMXJBhg6NTNZUH4Mbyy
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1076-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2344 wrote to memory of 1076 2344 rundll32.exe 84 PID 2344 wrote to memory of 1076 2344 rundll32.exe 84 PID 2344 wrote to memory of 1076 2344 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd5471a6f6c8ff7c3ad5eb99d5810a73_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd5471a6f6c8ff7c3ad5eb99d5810a73_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1076
-