Analysis
-
max time kernel
132s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 13:15
Behavioral task
behavioral1
Sample
bbe069e84359fcd1ec9e5b928e4a608a_JaffaCakes118.dll
Resource
win7-20240729-en
3 signatures
150 seconds
General
-
Target
bbe069e84359fcd1ec9e5b928e4a608a_JaffaCakes118.dll
-
Size
73KB
-
MD5
bbe069e84359fcd1ec9e5b928e4a608a
-
SHA1
b2ccd9073dd450135e20477ee2c40d7d97ebcc87
-
SHA256
9b5d8a768927e05f3b7763473b69c3fc5feba4beaa120940c5092c59f1cd5e74
-
SHA512
38b2c495df9c401a706d60ab42020ce08489488ad26acffa9f7da5885ccfafd8411e6a0acbb84c1073442b2bd9c75cc3a3f7276322bea3e977931b35c428e242
-
SSDEEP
1536:hXGa7ReQCSMcbkfUELCZafTilg1RMPbyU3r+NU4U7nCtitH1OMfNd51k+GXrjZ:r7RCSAUELeNe1mPbyU3rkUnD1tV7fduL
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3192-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4124 wrote to memory of 3192 4124 rundll32.exe 87 PID 4124 wrote to memory of 3192 4124 rundll32.exe 87 PID 4124 wrote to memory of 3192 4124 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bbe069e84359fcd1ec9e5b928e4a608a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bbe069e84359fcd1ec9e5b928e4a608a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3192
-