Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 04:20
Behavioral task
behavioral1
Sample
0459085494b1c5ce007eb82132faa34c_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
0459085494b1c5ce007eb82132faa34c_JaffaCakes118.dll
-
Size
57KB
-
MD5
0459085494b1c5ce007eb82132faa34c
-
SHA1
c4285ced60043b0aac2bc48a152655f9cfe0adf0
-
SHA256
b741b180b0beca5124dbddea7b08cd3b02d602426917357eb270cd1a4d92e0be
-
SHA512
2be6a8a2c28fac0382fb1fdf5f1a47cb74d9ffe21d3018e74bec0a6f6b5047ce44a65847cb75807fad1fd01dbc116b14cc7f071e5c0e3b7f8c4ca9abc6c2d4b2
-
SSDEEP
1536:e6PViKgShvoSLdMSQKg35eZpOW/ePs7ISFtS:RViKV2SLdsKe5cpTIs73FtS
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2512-3-0x0000000010000000-0x000000001000C000-memory.dmp upx behavioral1/memory/2512-2-0x0000000010000000-0x000000001000C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2512 2508 rundll32.exe 30 PID 2508 wrote to memory of 2512 2508 rundll32.exe 30 PID 2508 wrote to memory of 2512 2508 rundll32.exe 30 PID 2508 wrote to memory of 2512 2508 rundll32.exe 30 PID 2508 wrote to memory of 2512 2508 rundll32.exe 30 PID 2508 wrote to memory of 2512 2508 rundll32.exe 30 PID 2508 wrote to memory of 2512 2508 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0459085494b1c5ce007eb82132faa34c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0459085494b1c5ce007eb82132faa34c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2512
-