Analysis
-
max time kernel
140s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 20:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fd14afe2ffb3c988a3fafeb9e1b4ea0d_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
General
-
Target
fd14afe2ffb3c988a3fafeb9e1b4ea0d_JaffaCakes118.dll
-
Size
79KB
-
MD5
fd14afe2ffb3c988a3fafeb9e1b4ea0d
-
SHA1
a310ce0934d666f78aae19617d430b81cb16d131
-
SHA256
8b411bb552254a4d4c592437bcb86c734cd7dd5c239ca0525a51faefe924f94b
-
SHA512
6f724341495978317d98e1283634d9c3ea1ff589a4be436ee4c9e08689dba85e63fd6abf8de6b6325a795c3e0fbe5825a2a2c33642319fcceb00f49f1468b0d0
-
SSDEEP
1536:CkePji/sez3OtqPkNHBYGviEN22UKhE6Tdjj0Gkbg5NKvgs:i2/s8+tqPShYGviEg2U4E6hvkGNKv
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2956-2-0x0000000010000000-0x000000001002B000-memory.dmp upx behavioral2/memory/2956-3-0x0000000010000000-0x000000001002B000-memory.dmp upx behavioral2/memory/2956-5-0x0000000010000000-0x000000001002B000-memory.dmp upx behavioral2/memory/2956-9-0x0000000010000000-0x000000001002B000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2956 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2988 wrote to memory of 2956 2988 rundll32.exe 82 PID 2988 wrote to memory of 2956 2988 rundll32.exe 82 PID 2988 wrote to memory of 2956 2988 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd14afe2ffb3c988a3fafeb9e1b4ea0d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd14afe2ffb3c988a3fafeb9e1b4ea0d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2956
-