Analysis
-
max time kernel
123s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 07:50
Behavioral task
behavioral1
Sample
bae5df3dc5a5ab8483e77814edeaccad_JaffaCakes118.dll
Resource
win7-20240705-en
windows7-x64
3 signatures
150 seconds
General
-
Target
bae5df3dc5a5ab8483e77814edeaccad_JaffaCakes118.dll
-
Size
48KB
-
MD5
bae5df3dc5a5ab8483e77814edeaccad
-
SHA1
d2ef8ead9820a7b61ba11d03d6ece1471bd99048
-
SHA256
7a6637bbf3a600b39fb27f107d7667b308731e0804cecdc600ea9fdec4ba96cb
-
SHA512
03c6795a515c6f9c84b542bb6fb8b1085db1100d32186606821124141da80069a6b2946b6b65af19a3959651476098fa6a85528267e5adcc5252005ab7e863f9
-
SSDEEP
768:nbY4lNoKcOA+G6GpR7m7cKrlFS7w+b2ayOvlR5oQ43DC1BP+1JEezs:EGNoxOAPlbKrm1b2aymHeJOBm1Jjs
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3804-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1728 wrote to memory of 3804 1728 rundll32.exe 83 PID 1728 wrote to memory of 3804 1728 rundll32.exe 83 PID 1728 wrote to memory of 3804 1728 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bae5df3dc5a5ab8483e77814edeaccad_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bae5df3dc5a5ab8483e77814edeaccad_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3804
-