Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/09/2024, 14:27
Behavioral task
behavioral1
Sample
f63610cf36b1a7805d3c177fa645131d_JaffaCakes118.dll
Resource
win7-20240708-en
4 signatures
150 seconds
General
-
Target
f63610cf36b1a7805d3c177fa645131d_JaffaCakes118.dll
-
Size
4.3MB
-
MD5
f63610cf36b1a7805d3c177fa645131d
-
SHA1
1bc4731c5a6603713c740b0327191016310ec573
-
SHA256
d245e623d19e79c4c48bb43e767dbe03d2b073d11f7d79ed7d67dbb57e524c9a
-
SHA512
3f573516036c93ae1a8da21fd400b8db88d204b6c8d85895057da04799888aef865f650ed72e26a3260f942397125833e3b3f2e3bae576d27c796c40e5b0ce3b
-
SSDEEP
49152:+Uk24uPpHV84/o7IWgqIFV8b6bU3ZwyGD3tYspj2jVHinV2V9vgxJpUNfOdIFdTm:k2lP/lWgqqV8WbbdQV92JONfXFAmk
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2156-6-0x0000000073A30000-0x0000000073E90000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2156 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2156 1892 rundll32.exe 30 PID 1892 wrote to memory of 2156 1892 rundll32.exe 30 PID 1892 wrote to memory of 2156 1892 rundll32.exe 30 PID 1892 wrote to memory of 2156 1892 rundll32.exe 30 PID 1892 wrote to memory of 2156 1892 rundll32.exe 30 PID 1892 wrote to memory of 2156 1892 rundll32.exe 30 PID 1892 wrote to memory of 2156 1892 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f63610cf36b1a7805d3c177fa645131d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f63610cf36b1a7805d3c177fa645131d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2156
-