Analysis
-
max time kernel
95s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 10:00
Behavioral task
behavioral1
Sample
f5c16e4f5b6e1a009be0a5838a8002b6_JaffaCakes118.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
f5c16e4f5b6e1a009be0a5838a8002b6_JaffaCakes118.dll
-
Size
57KB
-
MD5
f5c16e4f5b6e1a009be0a5838a8002b6
-
SHA1
2c3ffd72da5b120c09f2c3516b451e767f2cf652
-
SHA256
edaa4ecdbc1b18330cdfe5260d66c4e61fabcc6dbc434d60c9a7f42e14c9936f
-
SHA512
ba2d03d8d395678c8610ff645aba988b56daa51a8a19643d633b7f40b33530e671d886f53162044dff862e99f8a48469c7f539c5a3c0a34777592c37e40700c2
-
SSDEEP
1536:86XzLcy3T55qE7aN6m/xf8P4Hqyz4mtxN61P6KoJ:ZLV3TelkYxU8Pz4aP61PcJ
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3124-0-0x0000000010000000-0x000000001000D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4304 wrote to memory of 3124 4304 rundll32.exe 82 PID 4304 wrote to memory of 3124 4304 rundll32.exe 82 PID 4304 wrote to memory of 3124 4304 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5c16e4f5b6e1a009be0a5838a8002b6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5c16e4f5b6e1a009be0a5838a8002b6_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3124
-