Analysis
-
max time kernel
95s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:58
Behavioral task
behavioral1
Sample
ea8afdb93554099d1a867a2ce008a3a7_JaffaCakes118.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
ea8afdb93554099d1a867a2ce008a3a7_JaffaCakes118.dll
-
Size
82KB
-
MD5
ea8afdb93554099d1a867a2ce008a3a7
-
SHA1
c77995575663b41def01eb4439e106374e418b56
-
SHA256
6be135f855f1ddb4e79297ffeb11077218b35967c079d9acf75d14d02319cb21
-
SHA512
9d98fb1db79366a16405ea9a1e87ca8939f0b582e5c4577b6585f9269581a3a8f1474960e4e6ad77af745c7d6c10c9d4c92f37adbeecf818ef61ad5f788f09d7
-
SSDEEP
1536:stVbpAYV9DPWYTC7mJsIB9srH+3aezlXouP+/05aJYBnsZ/:st5SYVcCC7mJ7B9srHeJvPa/YBnsZ/
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3300-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4616 wrote to memory of 3300 4616 rundll32.exe 82 PID 4616 wrote to memory of 3300 4616 rundll32.exe 82 PID 4616 wrote to memory of 3300 4616 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea8afdb93554099d1a867a2ce008a3a7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea8afdb93554099d1a867a2ce008a3a7_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3300
-