Analysis
-
max time kernel
96s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 21:56
Behavioral task
behavioral1
Sample
2605ed617a1166a934db4b4688555c4a_JaffaCakes118.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
2605ed617a1166a934db4b4688555c4a_JaffaCakes118.dll
-
Size
149KB
-
MD5
2605ed617a1166a934db4b4688555c4a
-
SHA1
31923f71b6bab4c09b5ac8e40fc389b7185f5577
-
SHA256
b9b089d856f627d62196ea9fa7cec329884b7e9bc558014e9003d78fbcc92b4f
-
SHA512
3996a0b6fd8af2836197ecc41e7a24dad395a6e81ccf945f5985f5ad3b6467987a442434388108a90a26cd5fcf39e3049e934dc31624ba23773d3301f6559e7c
-
SSDEEP
3072:d9JAGVENv2NMJ/woEqYniVx9IK86nN8Eno7VvPFrcdDOtz+6:rJAGVyO2yzqYm9IENb2PRcdU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1648-0-0x0000000010000000-0x0000000010058000-memory.dmp vmprotect behavioral2/memory/1648-1-0x0000000010000000-0x0000000010058000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 760 wrote to memory of 1648 760 rundll32.exe 83 PID 760 wrote to memory of 1648 760 rundll32.exe 83 PID 760 wrote to memory of 1648 760 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2605ed617a1166a934db4b4688555c4a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2605ed617a1166a934db4b4688555c4a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1648
-