Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 01:35
Static task
static1
Behavioral task
behavioral1
Sample
54c10d194477f776c11d5fd799a32461_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
54c10d194477f776c11d5fd799a32461_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
54c10d194477f776c11d5fd799a32461_JaffaCakes118.dll
-
Size
128KB
-
MD5
54c10d194477f776c11d5fd799a32461
-
SHA1
07d2e807a62cac1b32b2bf7fb43cc4b388b6eba3
-
SHA256
c6993ba609c2b4753151618b0ce77df670e6ffc8e918b8b7082edf8620f482ef
-
SHA512
1f6b0437a9d897388a9f6f31e50d4fe33a79f3458ff2787c7c6196b8d1bd09609c7367430ba5d63bdf3a379ce1f030e28baf81ef7168344bb41dc6de042c2475
-
SSDEEP
3072:GmmLaSuoYPQRbFBd6trerdsd4XD7Tt74VrwuVtCOt8bFik:GmyU/4d/doreWdC7574VrhVAOtsFik
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2748-7-0x0000000000170000-0x000000000017E000-memory.dmp upx behavioral1/memory/2748-6-0x0000000000170000-0x000000000017E000-memory.dmp upx behavioral1/memory/2748-4-0x0000000000170000-0x000000000017E000-memory.dmp upx behavioral1/memory/2748-3-0x0000000000170000-0x000000000017E000-memory.dmp upx behavioral1/memory/2748-0-0x0000000000170000-0x000000000017E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\Upstreezing Gain: InBuf rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2484 wrote to memory of 2748 2484 rundll32.exe 30 PID 2484 wrote to memory of 2748 2484 rundll32.exe 30 PID 2484 wrote to memory of 2748 2484 rundll32.exe 30 PID 2484 wrote to memory of 2748 2484 rundll32.exe 30 PID 2484 wrote to memory of 2748 2484 rundll32.exe 30 PID 2484 wrote to memory of 2748 2484 rundll32.exe 30 PID 2484 wrote to memory of 2748 2484 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54c10d194477f776c11d5fd799a32461_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54c10d194477f776c11d5fd799a32461_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- NTFS ADS
PID:2748
-