Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 04:01
Behavioral task
behavioral1
Sample
555e43f7c8825aa0950984b008e9df75_JaffaCakes118.dll
Resource
win7-20241010-en
3 signatures
150 seconds
General
-
Target
555e43f7c8825aa0950984b008e9df75_JaffaCakes118.dll
-
Size
72KB
-
MD5
555e43f7c8825aa0950984b008e9df75
-
SHA1
210a27f381435b37fa7fdfdc007211ca514ac48e
-
SHA256
9f40576f35717be2784eb38f1d245021b2744572aed4fa144ce3a94605e291f2
-
SHA512
253e9c76e803e3a6f0933d683ac08e293fb9226f902e05d10f9848ba3733ead2e449ac6d5abde690dffeb33fff3c3bce070f7ae611140e53bffda24820f0e72b
-
SSDEEP
1536:EdNs9O6qwtr21l6TcEVyGR6jZw+6g7N9sCcz9sqoon3OKHO95ZfQzi:EdNs9O6rryCRwN0C9cHOlom
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1144-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4344 wrote to memory of 1144 4344 rundll32.exe 84 PID 4344 wrote to memory of 1144 4344 rundll32.exe 84 PID 4344 wrote to memory of 1144 4344 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\555e43f7c8825aa0950984b008e9df75_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\555e43f7c8825aa0950984b008e9df75_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1144
-