Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-10-2024 17:31
Behavioral task
behavioral1
Sample
435c13962ed385f2ad03c1b7f831c8ea_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
435c13962ed385f2ad03c1b7f831c8ea_JaffaCakes118.dll
-
Size
58KB
-
MD5
435c13962ed385f2ad03c1b7f831c8ea
-
SHA1
709ff94a7c9dcf5a9106cd65852eeab5a6b06721
-
SHA256
63d1b5338257e33f948225fb772fb86d431ae560b3a45bd06f5313099d50adff
-
SHA512
2a90a70e6a00242a7c147f8aea60ece3bf144ade6b7acc54682e88c3110de1da0e7733b2e80ff91de5de45ecc8582c4bf5a19a17479ca7eb41f2d5f25f112496
-
SSDEEP
1536:1kKcnpm8Zrsm6yv4EnrBkGDlUtzJ0ip64/:1Qn08NZzSGSzLp64/
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2072-2-0x0000000010000000-0x000000001000D000-memory.dmp upx behavioral1/memory/2072-3-0x0000000010000000-0x000000001000D000-memory.dmp upx behavioral1/memory/2072-1-0x0000000010000000-0x000000001000D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2072 1292 rundll32.exe 30 PID 1292 wrote to memory of 2072 1292 rundll32.exe 30 PID 1292 wrote to memory of 2072 1292 rundll32.exe 30 PID 1292 wrote to memory of 2072 1292 rundll32.exe 30 PID 1292 wrote to memory of 2072 1292 rundll32.exe 30 PID 1292 wrote to memory of 2072 1292 rundll32.exe 30 PID 1292 wrote to memory of 2072 1292 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\435c13962ed385f2ad03c1b7f831c8ea_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\435c13962ed385f2ad03c1b7f831c8ea_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2072
-