Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/10/2024, 10:55
Behavioral task
behavioral1
Sample
0a4fe5ac101b1ae3e628cf545afbdb2a_JaffaCakes118.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
0a4fe5ac101b1ae3e628cf545afbdb2a_JaffaCakes118.dll
-
Size
16KB
-
MD5
0a4fe5ac101b1ae3e628cf545afbdb2a
-
SHA1
520a7f37ededb605da4b35737059bbf451573495
-
SHA256
a33519d021a66ab9962d37745de510ededf04d29dfea2d7e57bf0aadcfe770ee
-
SHA512
681c812546e45a72b509b7bc9ac9256db328ed66927823a48c23060f10a021ab4a91f13ebe7ada1b6145759cf2faaa1c67139f5dc09e7b1b137c1e97d0591583
-
SSDEEP
384:s6/KXxMju6x8TSSKX2jTCRIfXElq7fJRp5De5TweGpkNSCFwyO:sgjP9X2jyyjRze5weMkNSf
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2972-2-0x0000000010000000-0x000000001000F000-memory.dmp upx behavioral1/memory/2972-1-0x0000000010000000-0x000000001000F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2972 3052 rundll32.exe 30 PID 3052 wrote to memory of 2972 3052 rundll32.exe 30 PID 3052 wrote to memory of 2972 3052 rundll32.exe 30 PID 3052 wrote to memory of 2972 3052 rundll32.exe 30 PID 3052 wrote to memory of 2972 3052 rundll32.exe 30 PID 3052 wrote to memory of 2972 3052 rundll32.exe 30 PID 3052 wrote to memory of 2972 3052 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a4fe5ac101b1ae3e628cf545afbdb2a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0a4fe5ac101b1ae3e628cf545afbdb2a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2972
-