Analysis
-
max time kernel
96s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 13:49
Behavioral task
behavioral1
Sample
da7bebc5ec676540d164cdcbc51ec43d_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
da7bebc5ec676540d164cdcbc51ec43d_JaffaCakes118.dll
-
Size
85KB
-
MD5
da7bebc5ec676540d164cdcbc51ec43d
-
SHA1
64cac6824f53f34c0fe1435a90c73708ae131e6c
-
SHA256
cc45f8bb5bb7bf757efe9bca058f0b447a5c27f7e642e2c935173ee631a24690
-
SHA512
88d7a33fe9eb69d5aa3c39f0a6d22d290edcd0830b5561313b058e333582aa9f871963386a09f78856f07386a37a149887674106a968176ba16eeefa22cfd018
-
SSDEEP
1536:uRtNn1pUBR8S8XFFebsVCnRQiB7pWyPLnuVbnq:uRtNn1pU0S8XFFMsVLc68
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1960-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1960 2292 rundll32.exe 83 PID 2292 wrote to memory of 1960 2292 rundll32.exe 83 PID 2292 wrote to memory of 1960 2292 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da7bebc5ec676540d164cdcbc51ec43d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da7bebc5ec676540d164cdcbc51ec43d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1960
-