Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 01:39
Static task
static1
Behavioral task
behavioral1
Sample
df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df42ed840c87e706e4a52d8911973ecf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
hallmark.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
hallmark.dll
Resource
win10v2004-20240802-en
General
-
Target
hallmark.dll
-
Size
129KB
-
MD5
56ee80321284606fd48e602a2bf8df71
-
SHA1
7a8d400be7e7940c590625a507aba340e0fad0e7
-
SHA256
5b728496b55d10f64e26ae76782c10cee898d819d27edcd5a297f1fd310988b4
-
SHA512
98d0b1e429c8c4bbe794fa2e267b6fc3bedfe240c30004645821a47dd999bcf44d840f22af101b5605966f0112ed85d1934cdb88cbef36658a6d8c63ab252063
-
SSDEEP
3072:LOZ8BCJ24BW/Fg4wNr/ZCA7EFAEluCbhntG:LbBCcO/jV/ZCDFAmuCXG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2552 2368 rundll32.exe 30 PID 2368 wrote to memory of 2552 2368 rundll32.exe 30 PID 2368 wrote to memory of 2552 2368 rundll32.exe 30 PID 2368 wrote to memory of 2552 2368 rundll32.exe 30 PID 2368 wrote to memory of 2552 2368 rundll32.exe 30 PID 2368 wrote to memory of 2552 2368 rundll32.exe 30 PID 2368 wrote to memory of 2552 2368 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\hallmark.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\hallmark.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2552
-