Analysis
-
max time kernel
94s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 15:21
Behavioral task
behavioral1
Sample
fecdf99d951dd680975de765f058ceeb_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
fecdf99d951dd680975de765f058ceeb_JaffaCakes118.dll
-
Size
59KB
-
MD5
fecdf99d951dd680975de765f058ceeb
-
SHA1
3e99cdd7f24930b8574c547ad263c30e9ae05e12
-
SHA256
b90f2d065bfdbbebcebbbdce5b47fbc85146eda3f5a856da6b7a72f209e455fa
-
SHA512
b5c3b6b8d6524a8d11001dfeb7501cd76b909370de459abd964a807735769884689281665fe6d6ae5f04e04117a7e14322f942b225e7a8604124ce44733c3df0
-
SSDEEP
1536:Z6yEOWXF+PiE/v2OD6IsVZ8OgMaGeyY5bqY4wVjuX8:Qc3PDeHIi5gJyomY4+aX8
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1188-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3960 wrote to memory of 1188 3960 rundll32.exe 83 PID 3960 wrote to memory of 1188 3960 rundll32.exe 83 PID 3960 wrote to memory of 1188 3960 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fecdf99d951dd680975de765f058ceeb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fecdf99d951dd680975de765f058ceeb_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1188
-