Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 15:22
Behavioral task
behavioral1
Sample
bc4a41f4baa48d3a3c8d9a52598999f2_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
bc4a41f4baa48d3a3c8d9a52598999f2_JaffaCakes118.dll
-
Size
64KB
-
MD5
bc4a41f4baa48d3a3c8d9a52598999f2
-
SHA1
0abbffa96d789ce2a08f2b71b496126139b65ed2
-
SHA256
c64b8a4fb074b990c9dedcaee2856867ee0f09bae160acac5c2a12144093d175
-
SHA512
82f3ab5c3bd66cb2e67671f29522b75829379dc877aee6bfbdae887e0c4ee237e28bee3473e396646a2bc157ae140ccdecceda842fad72aead39f1c6ac15ce3d
-
SSDEEP
1536:evxQycnHL8CXwzQ9Y5vf9gtk5or3I7UoI:wqH/p9+vfukKr3I7jI
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/860-0-0x0000000010000000-0x000000001000C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4432 wrote to memory of 860 4432 rundll32.exe 84 PID 4432 wrote to memory of 860 4432 rundll32.exe 84 PID 4432 wrote to memory of 860 4432 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc4a41f4baa48d3a3c8d9a52598999f2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc4a41f4baa48d3a3c8d9a52598999f2_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:860
-