Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 04:20
Behavioral task
behavioral1
Sample
0459085494b1c5ce007eb82132faa34c_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
0459085494b1c5ce007eb82132faa34c_JaffaCakes118.dll
-
Size
57KB
-
MD5
0459085494b1c5ce007eb82132faa34c
-
SHA1
c4285ced60043b0aac2bc48a152655f9cfe0adf0
-
SHA256
b741b180b0beca5124dbddea7b08cd3b02d602426917357eb270cd1a4d92e0be
-
SHA512
2be6a8a2c28fac0382fb1fdf5f1a47cb74d9ffe21d3018e74bec0a6f6b5047ce44a65847cb75807fad1fd01dbc116b14cc7f071e5c0e3b7f8c4ca9abc6c2d4b2
-
SSDEEP
1536:e6PViKgShvoSLdMSQKg35eZpOW/ePs7ISFtS:RViKV2SLdsKe5cpTIs73FtS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4924-0-0x0000000010000000-0x000000001000C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4240 wrote to memory of 4924 4240 rundll32.exe 82 PID 4240 wrote to memory of 4924 4240 rundll32.exe 82 PID 4240 wrote to memory of 4924 4240 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0459085494b1c5ce007eb82132faa34c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0459085494b1c5ce007eb82132faa34c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4924
-