Analysis
-
max time kernel
93s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 10:22
Behavioral task
behavioral1
Sample
cf532015ca5629f61ffa70cd82639f1a_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
cf532015ca5629f61ffa70cd82639f1a_JaffaCakes118.dll
-
Size
54KB
-
MD5
cf532015ca5629f61ffa70cd82639f1a
-
SHA1
7b2e28cf214e13503aa520d538fc9fc0277a8043
-
SHA256
35cc8da172e5ca4fd7954efe0dd2f89fdb01f00c5f8e1c3d5fb472e61a7cc582
-
SHA512
e9435c9104d823528ca5cf44c0ff45198417350ca9486c4bcc7717535913312655a76c5c8db38f93b94cba324804597c2a67d3e9d7c63fd32da842f973ca0c35
-
SSDEEP
1536:s65kur9+8JrMcG8DjmO9xIrfJEB3dPBI3PCaZxNBPXD91R:trMgrHfDjmO9xIrJEBNPBIq4VF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4972-0-0x0000000010000000-0x0000000010016000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1816 wrote to memory of 4972 1816 rundll32.exe 83 PID 1816 wrote to memory of 4972 1816 rundll32.exe 83 PID 1816 wrote to memory of 4972 1816 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf532015ca5629f61ffa70cd82639f1a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cf532015ca5629f61ffa70cd82639f1a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4972
-