Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/09/2024, 03:38
Behavioral task
behavioral1
Sample
ea83e720567a4c97fc1276ea11bd8928_JaffaCakes118.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
ea83e720567a4c97fc1276ea11bd8928_JaffaCakes118.dll
-
Size
98KB
-
MD5
ea83e720567a4c97fc1276ea11bd8928
-
SHA1
42b0ffae0f58d1be178e0be0740c84649b1598dd
-
SHA256
ce51137d2f539f66ff168f5ce4f439b66e6195d67fd69b6e6a0d4fedc933fdfb
-
SHA512
c20496fe9ddd902cc41202874273e048908b85f90e340a91fa5cc2681dbaf3bf0f6756765b12e21f1a2c6c50fcf789195584485d3ec95db0833dc4a602fb402b
-
SSDEEP
1536:SQclh8MIwu5+oYjyTRRWBN3Y+gOZbHGD8MdLrx84xlY93st:ahdIw/oYjuRRW1gYKD8Kp8v+t
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2772-0-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/2772-1-0x0000000010000000-0x000000001000F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2772 2692 rundll32.exe 30 PID 2692 wrote to memory of 2772 2692 rundll32.exe 30 PID 2692 wrote to memory of 2772 2692 rundll32.exe 30 PID 2692 wrote to memory of 2772 2692 rundll32.exe 30 PID 2692 wrote to memory of 2772 2692 rundll32.exe 30 PID 2692 wrote to memory of 2772 2692 rundll32.exe 30 PID 2692 wrote to memory of 2772 2692 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea83e720567a4c97fc1276ea11bd8928_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea83e720567a4c97fc1276ea11bd8928_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2772
-