Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05/10/2024, 01:12
Behavioral task
behavioral1
Sample
159909423b48139f4f86dda399f353d0_JaffaCakes118.dll
Resource
win7-20240729-en
3 signatures
150 seconds
General
-
Target
159909423b48139f4f86dda399f353d0_JaffaCakes118.dll
-
Size
25KB
-
MD5
159909423b48139f4f86dda399f353d0
-
SHA1
2609ab2f3119132db118a7328573f212b4e29d12
-
SHA256
2bba41642ce95f61ae76d3467fc9a6fedb9a7b1dce556f7ce73401d27aeb495a
-
SHA512
ba672852741a9c111ac241ce869007ad2c1cc2a61a8ad7abb0223195415df06fae0e17425affe4d53ad4738c50a43ef32a5a7d5c71e056e792e91d316a09c618
-
SSDEEP
384:d4cvbhvCA6G1vaiuZRss4+p6h12zIf7jU0c0JOmKDCvjRiaaHC8V86rtk:d1zuG1pYRnZMvwsjXvUu7RaC+8+tk
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2512-0-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral1/memory/2512-2-0x0000000010000000-0x0000000010014000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2512 2528 rundll32.exe 29 PID 2528 wrote to memory of 2512 2528 rundll32.exe 29 PID 2528 wrote to memory of 2512 2528 rundll32.exe 29 PID 2528 wrote to memory of 2512 2528 rundll32.exe 29 PID 2528 wrote to memory of 2512 2528 rundll32.exe 29 PID 2528 wrote to memory of 2512 2528 rundll32.exe 29 PID 2528 wrote to memory of 2512 2528 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\159909423b48139f4f86dda399f353d0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\159909423b48139f4f86dda399f353d0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2512
-