Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 05:02
Behavioral task
behavioral1
Sample
0e0bc331568ce913063f3565f076b39c_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
0e0bc331568ce913063f3565f076b39c_JaffaCakes118.dll
-
Size
141KB
-
MD5
0e0bc331568ce913063f3565f076b39c
-
SHA1
9b4894de5b34e19ca288e8529cec50fc82098e46
-
SHA256
a0612edab1bfbbbfe0917f90acc6036e499dcf746d55ddca94f9a1eb72631765
-
SHA512
7d63be939415dc84415a9ee099e6196e9321e1cb5ecc966604759ac2c111dfd139e3ea9d37a1bc3d47357bc56d5225ecc0bb4c9cbfc268088bcb3f9cc1c92638
-
SSDEEP
1536:1cwwwHj95OW6JriX/9j1AFwtQapadExEYbX3P+nkYaoOJkgEoBf:1ZbOW6G1j1AWtvpadqEknPGkYaZCe
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2896-0-0x0000000010000000-0x0000000010017000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2896 2060 rundll32.exe 82 PID 2060 wrote to memory of 2896 2060 rundll32.exe 82 PID 2060 wrote to memory of 2896 2060 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e0bc331568ce913063f3565f076b39c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e0bc331568ce913063f3565f076b39c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2896
-