Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 10:17
Behavioral task
behavioral1
Sample
ef944df27628c111e338060cea8a31ee_JaffaCakes118.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
ef944df27628c111e338060cea8a31ee_JaffaCakes118.dll
-
Size
56KB
-
MD5
ef944df27628c111e338060cea8a31ee
-
SHA1
ec59ee06070ffff0e97dc2b1c6fe441a1615878f
-
SHA256
2e0d84e47ca5dd397d29a3bd56f019af97c21cd747f334e2459081abd604f066
-
SHA512
5e5fad8f6c92c1eae496d25913def19137db32e7801fb4cb2ef13af8288e736601e9c6d5b46807d7a40075ddb1e7df767713dd9362426743aabe66dae3bafac8
-
SSDEEP
1536:Iykzkagtqx4Hm7fNQVVMpF1hXUvc/EErX:IFzkauRHm7fNPDXUABX
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2900-0-0x0000000010000000-0x000000001000F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2900 2100 rundll32.exe 82 PID 2100 wrote to memory of 2900 2100 rundll32.exe 82 PID 2100 wrote to memory of 2900 2100 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef944df27628c111e338060cea8a31ee_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef944df27628c111e338060cea8a31ee_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2900
-