Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 01:12
Behavioral task
behavioral1
Sample
159909423b48139f4f86dda399f353d0_JaffaCakes118.dll
Resource
win7-20240729-en
3 signatures
150 seconds
General
-
Target
159909423b48139f4f86dda399f353d0_JaffaCakes118.dll
-
Size
25KB
-
MD5
159909423b48139f4f86dda399f353d0
-
SHA1
2609ab2f3119132db118a7328573f212b4e29d12
-
SHA256
2bba41642ce95f61ae76d3467fc9a6fedb9a7b1dce556f7ce73401d27aeb495a
-
SHA512
ba672852741a9c111ac241ce869007ad2c1cc2a61a8ad7abb0223195415df06fae0e17425affe4d53ad4738c50a43ef32a5a7d5c71e056e792e91d316a09c618
-
SSDEEP
384:d4cvbhvCA6G1vaiuZRss4+p6h12zIf7jU0c0JOmKDCvjRiaaHC8V86rtk:d1zuG1pYRnZMvwsjXvUu7RaC+8+tk
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1692-0-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral2/memory/1692-1-0x0000000010000000-0x0000000010014000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 540 wrote to memory of 1692 540 rundll32.exe 82 PID 540 wrote to memory of 1692 540 rundll32.exe 82 PID 540 wrote to memory of 1692 540 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\159909423b48139f4f86dda399f353d0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\159909423b48139f4f86dda399f353d0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1692
-