Analysis
-
max time kernel
96s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2024, 04:47
Behavioral task
behavioral1
Sample
e1bae01fe6011cc0b080bb9e1d2775a3_JaffaCakes118.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
e1bae01fe6011cc0b080bb9e1d2775a3_JaffaCakes118.dll
-
Size
54KB
-
MD5
e1bae01fe6011cc0b080bb9e1d2775a3
-
SHA1
456e0d6cef2574c434292da8ab312288e9e90e65
-
SHA256
a5dc7924e4cc6c73270abf533c5e0c6fb01979729ee9d4e9918c6f3bf50ef34e
-
SHA512
a01f145fc8b37fc4ef4f98cc6c4824d56761c32157e18e0afd0187852e2ba376c5933efd0b78c73832fde8cd6f672c7f12df639e01bc169b889f8aeb1d081ad6
-
SSDEEP
1536:hXGa7ReQCuYg/OIAkXHGk+NFRfmBAvba6Bh:r7RCBghA8Gk+NFReAvbV
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3824-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1112 wrote to memory of 3824 1112 rundll32.exe 83 PID 1112 wrote to memory of 3824 1112 rundll32.exe 83 PID 1112 wrote to memory of 3824 1112 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1bae01fe6011cc0b080bb9e1d2775a3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1bae01fe6011cc0b080bb9e1d2775a3_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3824
-