Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 18:51
Behavioral task
behavioral1
Sample
0c0ac642f8149fbdb1f57790f3a877a3_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
0c0ac642f8149fbdb1f57790f3a877a3_JaffaCakes118.dll
-
Size
83KB
-
MD5
0c0ac642f8149fbdb1f57790f3a877a3
-
SHA1
2600aca437df925014acb0edbeac7c2bb1637d15
-
SHA256
5da4fbb83b68c662bff81bce8733f8761a041567d1ee0399cd393b9d06d37312
-
SHA512
35498946043d6a70b81790edaafa354853cb0047c12084fdd5aefad720a3fab6e2c9ec65bb0587f3f2b32cd206324e7197992060c26863ceacc79c8851301c56
-
SSDEEP
1536:unkD/FweUgC60osAajVpSguCT+e3ri6jP/e66M6sUAzVP1CSMucKPa+aKmW:4kDttUL60os3SjCTtO7Ls3d1CSZcKP5N
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2064-3-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/2064-2-0x0000000010000000-0x000000001000E000-memory.dmp upx behavioral1/memory/2064-1-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2064 2072 rundll32.exe 30 PID 2072 wrote to memory of 2064 2072 rundll32.exe 30 PID 2072 wrote to memory of 2064 2072 rundll32.exe 30 PID 2072 wrote to memory of 2064 2072 rundll32.exe 30 PID 2072 wrote to memory of 2064 2072 rundll32.exe 30 PID 2072 wrote to memory of 2064 2072 rundll32.exe 30 PID 2072 wrote to memory of 2064 2072 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c0ac642f8149fbdb1f57790f3a877a3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c0ac642f8149fbdb1f57790f3a877a3_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2064
-