Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 11:50
Behavioral task
behavioral1
Sample
39db8c85c6aca3b0b78dc2a6d244f411_JaffaCakes118.dll
Resource
win7-20241010-en
3 signatures
150 seconds
General
-
Target
39db8c85c6aca3b0b78dc2a6d244f411_JaffaCakes118.dll
-
Size
38KB
-
MD5
39db8c85c6aca3b0b78dc2a6d244f411
-
SHA1
21e969c96e032697a83a155e65c3fe64558b701d
-
SHA256
c4e122ffb977518753bde5c29b6a14c8bd02240497e0e225724ec0dffd5fc0dd
-
SHA512
dd4f2e3a578ade35af366fe93abe12c6c49ebd9e9d527e23f3de557dc2996b40b00c70daf2f44d4a7b86ebeda950de585c5a793cb1abe5b66a45ccd2e6a15ade
-
SSDEEP
768:bQ39sJa+bg0/4r4GttQ3G8LUdab00EeQ+hy+gMDDGAUkTznGzJW+:bQNG9gw4r/bQwdKtEeLymPjUkWzn
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2280-0-0x0000000002100000-0x0000000002122000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4416 wrote to memory of 2280 4416 rundll32.exe 83 PID 4416 wrote to memory of 2280 4416 rundll32.exe 83 PID 4416 wrote to memory of 2280 4416 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39db8c85c6aca3b0b78dc2a6d244f411_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39db8c85c6aca3b0b78dc2a6d244f411_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2280
-