Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 13:34
Static task
static1
Behavioral task
behavioral1
Sample
e049bf2e95cfd9354cd04da57dc33e0d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e049bf2e95cfd9354cd04da57dc33e0d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
tdh.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
tdh.dll
Resource
win10v2004-20240802-en
General
-
Target
tdh.dll
-
Size
20KB
-
MD5
1dafb2cf34f35d5814c11c4c7c97aad8
-
SHA1
3f49bcb442c672bda015eebc1e1e6ca8584b2c01
-
SHA256
a6ab79699435b6f5879e540cb754be7a637e7b878b3decd87a6a9445f81ae6d6
-
SHA512
c8c0b1529aae25a95b053f82724ac1b60e4a1ab3493187691aab8a46c93414379222c06de238b7f351bd062ab7aa8a03e5d5b2122a0d9b1b30712501b6780365
-
SSDEEP
384:yUd16SbVPzBmM6I/5qCXRw14yIngycpX6KsJndf+PXwMqdDrCHzKmO:aS0IxNRQIgyYXHkndWoM1TKv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2256 2252 rundll32.exe 29 PID 2252 wrote to memory of 2256 2252 rundll32.exe 29 PID 2252 wrote to memory of 2256 2252 rundll32.exe 29 PID 2252 wrote to memory of 2256 2252 rundll32.exe 29 PID 2252 wrote to memory of 2256 2252 rundll32.exe 29 PID 2252 wrote to memory of 2256 2252 rundll32.exe 29 PID 2252 wrote to memory of 2256 2252 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\tdh.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\tdh.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2256
-