Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 06:44
Behavioral task
behavioral1
Sample
d14fc0eeeee463438db27230f0c8e77e_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
d14fc0eeeee463438db27230f0c8e77e_JaffaCakes118.dll
-
Size
59KB
-
MD5
d14fc0eeeee463438db27230f0c8e77e
-
SHA1
d913ab7283677cff3955eec719e3980bb03683b2
-
SHA256
35263f12d48b94d378e7d63c45a8a5bb6cc887f92b1cce4e5c6cfeb3b0283678
-
SHA512
8af0d6b09ab911395d582cee7abb11326407c3c69ce8974f63de1e764f64511a1df9c4091493e35589b9113aed1826d835470de5549b9f8043d362bf0836bb06
-
SSDEEP
1536:yl3E0TYsN4tc2uRk8syJ8JrqUymj/jUa2m:E39fmmJ8JrBymjbUa2m
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4680-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4476 wrote to memory of 4680 4476 rundll32.exe 83 PID 4476 wrote to memory of 4680 4476 rundll32.exe 83 PID 4476 wrote to memory of 4680 4476 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d14fc0eeeee463438db27230f0c8e77e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d14fc0eeeee463438db27230f0c8e77e_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4680
-