Analysis
-
max time kernel
92s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 10:56
Behavioral task
behavioral1
Sample
176780ee653b98857fe7245b05c5b422_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
176780ee653b98857fe7245b05c5b422_JaffaCakes118.dll
-
Size
69KB
-
MD5
176780ee653b98857fe7245b05c5b422
-
SHA1
1d9116e3957b8de4c62fa94fa8b1818a41af652e
-
SHA256
5376ecae47c2275bc5b2cf0f9d1f65382cd85fda8c44654f08dc567183640eee
-
SHA512
fd7b9c5334a1114db565ca4e1c052a17f015f66bf25b89e27564ad7484c95a0eb294d4e812484cd1be5c3e530710b2cfe4dd89d91cb567f56970c64a6a961acf
-
SSDEEP
1536:Bm1NGJVGWV2hasX1K6A53p8xWyHdUGfglYur9ULBsL0i8:kX0VurA53plyHdUtlYm9ULJ7
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3452-0-0x0000000010000000-0x0000000010013000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1616 wrote to memory of 3452 1616 rundll32.exe 82 PID 1616 wrote to memory of 3452 1616 rundll32.exe 82 PID 1616 wrote to memory of 3452 1616 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\176780ee653b98857fe7245b05c5b422_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\176780ee653b98857fe7245b05c5b422_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3452
-