Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 02:59
Behavioral task
behavioral1
Sample
3821bdd1457fcbb5553740d00c733a51_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
3821bdd1457fcbb5553740d00c733a51_JaffaCakes118.dll
-
Size
58KB
-
MD5
3821bdd1457fcbb5553740d00c733a51
-
SHA1
b95774b8220df244a0dd31f11eca5a8a8f06d28f
-
SHA256
b27f5a211440da5590fe8df39eacf8d38c735797bfde96a7e62a719556a39e22
-
SHA512
1495f615c015b055f292febaa87122b7424767a78c223c5a050664d927591bbe2333b27727600e2758542d565990c09b772a994b89f892b56aa11e70665948be
-
SSDEEP
768:tndsGUNjHEDNOxWZIuqdpLXEuh/VBXCCLLYijxtdY1D8Kc94ZpsTPmicT7Y:jPekD0wVqbLJBXnLYijtYN5c94Psr3uY
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1112-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1624 wrote to memory of 1112 1624 rundll32.exe 83 PID 1624 wrote to memory of 1112 1624 rundll32.exe 83 PID 1624 wrote to memory of 1112 1624 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3821bdd1457fcbb5553740d00c733a51_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3821bdd1457fcbb5553740d00c733a51_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1112
-