Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 04:51
Behavioral task
behavioral1
Sample
ea9eb93f0b3c558811498b7ea44dc7db_JaffaCakes118.dll
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
ea9eb93f0b3c558811498b7ea44dc7db_JaffaCakes118.dll
-
Size
4KB
-
MD5
ea9eb93f0b3c558811498b7ea44dc7db
-
SHA1
1c6baa1b6e4d8237537560cdc3ff90fb5b4ceb7a
-
SHA256
1a35c3bee9c77f7ccf6972fb4a20a138ae526c3e4bece4af4973b8e664aa6713
-
SHA512
0531fd9afc0fc1aaadf5d1ab196d33429019b9d4965cdb141d802fcec4672934ce6d34fa04ad03f34ea9c3a5ba336bad6a697dd2243c3e16909826a3986bba1c
-
SSDEEP
48:Cyv65WSVlwQFfylfMwlNoXJu0b4Oa8nUWEa+q6+0clnAtUYfzDCB2FSeJY8JTaCH:Dv6/V2QF6uwvGbmxClmXDCBmo9Q
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/2472-0-0x0000000010000000-0x0000000010017000-memory.dmp acprotect behavioral2/memory/2472-1-0x0000000010000000-0x0000000010017000-memory.dmp acprotect -
resource yara_rule behavioral2/memory/2472-0-0x0000000010000000-0x0000000010017000-memory.dmp upx behavioral2/memory/2472-1-0x0000000010000000-0x0000000010017000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2472 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2472 2160 rundll32.exe 82 PID 2160 wrote to memory of 2472 2160 rundll32.exe 82 PID 2160 wrote to memory of 2472 2160 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea9eb93f0b3c558811498b7ea44dc7db_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea9eb93f0b3c558811498b7ea44dc7db_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2472
-