Analysis
-
max time kernel
140s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 02:49
Behavioral task
behavioral1
Sample
1185a0d736b2514a78c3e63dfbfbf2f8_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1185a0d736b2514a78c3e63dfbfbf2f8_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
active.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
active.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
usbdrv.exe
Resource
win7-20240708-en
General
-
Target
active.dll
-
Size
83KB
-
MD5
8c46879b9861ecd0c23cb377e69c1ccf
-
SHA1
c54a507bab604709edaa14dd5b6b17422a4424fc
-
SHA256
c36ff6a9957222a69d876bc27e55c869174c1c9bf7b43758dc36c6de134d4cbe
-
SHA512
465e0341f538a6c164073f8a8632a7c9d451d98e223e57fd68e25e3a872efeaeb46bdbf66826323c69f5e060c0b3a95aeddfb78ff4e05f0c289c8cc0646c0321
-
SSDEEP
1536:LVx5ufoijUQpW7erAAGxRO9Ma5hAN2Y+a2jI1m8u0Mv1OElOBF:9uIeL0OimhAN5+aJRd/ElOB
Malware Config
Signatures
-
resource yara_rule behavioral4/memory/5020-0-0x0000000074F60000-0x0000000074F9A000-memory.dmp upx behavioral4/memory/5020-2-0x0000000074F60000-0x0000000074F9A000-memory.dmp upx behavioral4/memory/5020-3-0x0000000074F60000-0x0000000074F9A000-memory.dmp upx behavioral4/memory/5020-15-0x0000000074F60000-0x0000000074F9A000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage rundll32.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4456 wrote to memory of 5020 4456 rundll32.exe 82 PID 4456 wrote to memory of 5020 4456 rundll32.exe 82 PID 4456 wrote to memory of 5020 4456 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\active.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\active.dll,#12⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:5020
-