Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 14:29
Behavioral task
behavioral1
Sample
3a841e607f7cf809e6f382afebcef6b4_JaffaCakes118.dll
Resource
win7-20241010-en
5 signatures
150 seconds
General
-
Target
3a841e607f7cf809e6f382afebcef6b4_JaffaCakes118.dll
-
Size
96KB
-
MD5
3a841e607f7cf809e6f382afebcef6b4
-
SHA1
29c1d41e4f3839ead30f242d79f9e80550ff65d4
-
SHA256
ca671a3da4363666fe0bbdee1e90f488b9a0bd056379712e190d8ed5b7492060
-
SHA512
a554ef67184162de9aa44d3040617157209ab954aa24758226d235d7c7d5080eebbf9f53cdfa30bae825497e313c2b55611eadabbfddd9b0758e395f0f11c8be
-
SSDEEP
1536:HgG4gwei6XuzqAIRM9TzwCSylcmGxSc/DElfaTA+rqklTw+fZo:HgG4gweDudIR+TzwCCxSoDEdaTANklTC
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/740-0-0x0000000010000000-0x000000001001C000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3992 wrote to memory of 740 3992 rundll32.exe 83 PID 3992 wrote to memory of 740 3992 rundll32.exe 83 PID 3992 wrote to memory of 740 3992 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a841e607f7cf809e6f382afebcef6b4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a841e607f7cf809e6f382afebcef6b4_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:740
-