Analysis
-
max time kernel
95s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 12:49
Behavioral task
behavioral1
Sample
3ff27983bfb1455ec44bf39d9d193673_JaffaCakes118.dll
Resource
win7-20240729-en
windows7-x64
3 signatures
150 seconds
General
-
Target
3ff27983bfb1455ec44bf39d9d193673_JaffaCakes118.dll
-
Size
52KB
-
MD5
3ff27983bfb1455ec44bf39d9d193673
-
SHA1
8e09e267dbc6619ee95d41c40d5f766a851a740a
-
SHA256
bfa69e2429bd69035ea11fbef49ce14461310696e32b5234c98c5def391a591e
-
SHA512
b6cc0ade77a64192730603908a3628260aa8754d7349960b8b455fb41e661e048fac53c236eb9147ef9cf13d04ee8f9445505f886fd599493768cb72e839a3bb
-
SSDEEP
768:2bHbIsfaJZd3lZ7yJ1FIAuFmdkBUQHP2+gvZ3On4+YbCsCGH9w7lsFdu581c+e/v:Y7BstH741F7mBH25D+BvdlsXuGc+e/Fx
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2732-0-0x0000000010000000-0x0000000010016000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4276 wrote to memory of 2732 4276 rundll32.exe 83 PID 4276 wrote to memory of 2732 4276 rundll32.exe 83 PID 4276 wrote to memory of 2732 4276 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ff27983bfb1455ec44bf39d9d193673_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ff27983bfb1455ec44bf39d9d193673_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2732
-