Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 05:22
Behavioral task
behavioral1
Sample
ddc0f94e2797df1de6c47fc8ce0cffe0_JaffaCakes118.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
ddc0f94e2797df1de6c47fc8ce0cffe0_JaffaCakes118.dll
-
Size
44KB
-
MD5
ddc0f94e2797df1de6c47fc8ce0cffe0
-
SHA1
63d465301242768546bb5cd8dcb3fbfd4d59189d
-
SHA256
1b9b6644aeda752f2d3cc2884c6dac211231c40f74fd7c4d35687966a2178ee2
-
SHA512
cc0e411572b5de35340cb7768f05d9bf6bfd2c61358756804a2d6658be8475e3ce41adda5d9a57f66e46983128bb0804fc3b674beab9b06c6ca5e791f948ff7f
-
SSDEEP
768:7zO58xEzVqHiBoMZd6VIMR2iqYUin3mB7m2Nv2ZcK:7nxE9KAAuMc3YU+3mJmWvocK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4380-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4972 wrote to memory of 4380 4972 rundll32.exe 83 PID 4972 wrote to memory of 4380 4972 rundll32.exe 83 PID 4972 wrote to memory of 4380 4972 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ddc0f94e2797df1de6c47fc8ce0cffe0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ddc0f94e2797df1de6c47fc8ce0cffe0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4380
-