Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 06:55
Behavioral task
behavioral1
Sample
124bcc22e27c1fb326d80edb4cf5ce5e_JaffaCakes118.dll
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
124bcc22e27c1fb326d80edb4cf5ce5e_JaffaCakes118.dll
-
Size
64KB
-
MD5
124bcc22e27c1fb326d80edb4cf5ce5e
-
SHA1
a865a6b8f6fd06a0731427ba184926e2f1294912
-
SHA256
e8d2a6e324cb74dc103101c7dfe303b79b5cdaf3a8fd0db4a9375a973136874c
-
SHA512
f2f3702401fbc8ac5b453ed782ce143844b971d3d5db1bd77c65a6eee9c5516c1e8dea0545bfcfa131eb3c67289baf48f751fc755e6c765765729fc3b7485c3c
-
SSDEEP
1536:yok0mU99RebQ1JmhQcnKhlcbujAK366EAaVRgBMNY:/maReYGQbhlcbMffEAyRcwY
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1464-0-0x0000000010000000-0x000000001000F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1464 3024 rundll32.exe 82 PID 3024 wrote to memory of 1464 3024 rundll32.exe 82 PID 3024 wrote to memory of 1464 3024 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\124bcc22e27c1fb326d80edb4cf5ce5e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\124bcc22e27c1fb326d80edb4cf5ce5e_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1464
-