Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 10:45
Behavioral task
behavioral1
Sample
39987fe6d209a385afa0497479ad43d2_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
3 signatures
150 seconds
General
-
Target
39987fe6d209a385afa0497479ad43d2_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
39987fe6d209a385afa0497479ad43d2
-
SHA1
26a57503461e4ce693ade5921f61f827bb8ae086
-
SHA256
e7c914e5ad586774f959125eca3df05fc07eb61beb0d145968c8361082a90ca5
-
SHA512
07c4af074589dd1962c2be66779b71eaac6757829f4dc662ab2f7835b47166f67dae295b1b04308c5a37fac31c55a6ee008de095dcea93e6499411d34d0ce7a5
-
SSDEEP
24576:GDTKk96eTPzBcTOE6IY02lSLxCSUsjcWWvvpoGvYHtFz16hz:GHKyXzB8Opp0tL0swWWhoZ8h
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2968-0-0x0000000010000000-0x00000000102AF000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3452 wrote to memory of 2968 3452 rundll32.exe 83 PID 3452 wrote to memory of 2968 3452 rundll32.exe 83 PID 3452 wrote to memory of 2968 3452 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39987fe6d209a385afa0497479ad43d2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39987fe6d209a385afa0497479ad43d2_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2968
-