Analysis
-
max time kernel
138s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 11:23
Behavioral task
behavioral1
Sample
be7c7ab5b5cd19ac739e679b8750c3bf_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
be7c7ab5b5cd19ac739e679b8750c3bf_JaffaCakes118.dll
-
Size
405KB
-
MD5
be7c7ab5b5cd19ac739e679b8750c3bf
-
SHA1
f5dd1d0c2a3b46b8c48a82dc98f709c2064e7f58
-
SHA256
44912d51643c8964fc13118dc678b42e6d85481bb33f154128f209f5c2a1135a
-
SHA512
cbb7ec7c9e231236e47a1b55c617ea336dedf33b2d1248d53e2bcea81185200b2a45b356b137e8631021aa934934a4b29c9a2e958343468eba7692c5493997b2
-
SSDEEP
6144:JOp3G2qjIY0yXqGI9mJaW8+cT39cPBJs7GooQL0LmEhlXbg3cQ1Pzqby3mnvn2nC:GyjUyQ9mJajD3aPzfrhlrI17qGidke
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1452-0-0x0000000010000000-0x0000000010128000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1180 wrote to memory of 1452 1180 rundll32.exe 85 PID 1180 wrote to memory of 1452 1180 rundll32.exe 85 PID 1180 wrote to memory of 1452 1180 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be7c7ab5b5cd19ac739e679b8750c3bf_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be7c7ab5b5cd19ac739e679b8750c3bf_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1452
-