Analysis
-
max time kernel
98s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 09:03
Behavioral task
behavioral1
Sample
de1b55906c7a1305b1a88698a7c5d9f4_JaffaCakes118.dll
Resource
win7-20240903-en
2 signatures
150 seconds
General
-
Target
de1b55906c7a1305b1a88698a7c5d9f4_JaffaCakes118.dll
-
Size
76KB
-
MD5
de1b55906c7a1305b1a88698a7c5d9f4
-
SHA1
6bf053adaa2b8d211040e776f8bea3976ee42846
-
SHA256
9398bcb867f7fa58f1320135db99e10370972ad2754761efaae643b14f59fcb9
-
SHA512
d714bb23ebe8099e5d5373e4a937b0d4a62998792f48fc64d4b20e057f0f8d5a7058f69c47ac8f90c7c85ef287d0b201b56eaed369b6ded56470ee98dba4d663
-
SSDEEP
1536:Iykzkag74dciIeJqU8Y5kX60tAAO3fj6RawYRKWiXKAK/onuRLwd8dDMiES:IFzkaVgSd8TwAOPj6RGRJkEAuRLwdOYS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/804-0-0x0000000010000000-0x000000001000F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5004 wrote to memory of 804 5004 rundll32.exe 83 PID 5004 wrote to memory of 804 5004 rundll32.exe 83 PID 5004 wrote to memory of 804 5004 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de1b55906c7a1305b1a88698a7c5d9f4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\de1b55906c7a1305b1a88698a7c5d9f4_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:804
-