Analysis
-
max time kernel
94s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 17:57
Behavioral task
behavioral1
Sample
4148a88a12f18aaeddcb5a7d9b4d0c2f_JaffaCakes118.dll
Resource
win7-20241010-en
windows7-x64
3 signatures
150 seconds
General
-
Target
4148a88a12f18aaeddcb5a7d9b4d0c2f_JaffaCakes118.dll
-
Size
274KB
-
MD5
4148a88a12f18aaeddcb5a7d9b4d0c2f
-
SHA1
899cc68ec92e30ffd37e40c0804630c0037015e8
-
SHA256
0621a8665a371176ca97af911dd8afbbee5d305f293de7739036539e22690d8c
-
SHA512
31c2b52b1d2a4e278f12ebadc50c2d585191b77e76ebb2ef68c60eda3bdff71de3b0107fb1ce5e16c1f758caabaf838de174652e3de55667b6d24e499a424c77
-
SSDEEP
6144:ZFvdHz8TdI/0mt9s+NCzFmln43WanQU/DCz05PzZ:ZFvdTKmrswgFQLU/WzkPd
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3724-0-0x0000000010000000-0x00000000100B9000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3592 wrote to memory of 3724 3592 rundll32.exe 82 PID 3592 wrote to memory of 3724 3592 rundll32.exe 82 PID 3592 wrote to memory of 3724 3592 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4148a88a12f18aaeddcb5a7d9b4d0c2f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4148a88a12f18aaeddcb5a7d9b4d0c2f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3724
-