Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 09:54
Behavioral task
behavioral1
Sample
56c8d05c80ed174c0c4ad7ef66992664_JaffaCakes118.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
56c8d05c80ed174c0c4ad7ef66992664_JaffaCakes118.dll
-
Size
98KB
-
MD5
56c8d05c80ed174c0c4ad7ef66992664
-
SHA1
ed356e8d257dce616cfa60732960aab24a2fc34c
-
SHA256
a72bde740f5ce412b73ed8d00cabb1fcfe24bd2bc1dc10a4ec0adfd0f6389faa
-
SHA512
5f640f17bddc9df6588c1d964aba501f8dd2ae72500b97ee89148f0350896d4534f6638f55b7b79a9db4d569e1981d4a11f381bb97a9038056ba2180f78a1c48
-
SSDEEP
3072:/Hq0ol/CLm89a/CwxCEKJ5oTLGCXeEZqU4dpnQ6:PwlrsaXKPKCUPqLdpp
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1696-2-0x0000000010000000-0x0000000010034000-memory.dmp vmprotect behavioral1/memory/1696-1-0x0000000010000000-0x0000000010034000-memory.dmp vmprotect behavioral1/memory/1696-4-0x0000000010000000-0x0000000010034000-memory.dmp vmprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1128 wrote to memory of 1696 1128 rundll32.exe 31 PID 1128 wrote to memory of 1696 1128 rundll32.exe 31 PID 1128 wrote to memory of 1696 1128 rundll32.exe 31 PID 1128 wrote to memory of 1696 1128 rundll32.exe 31 PID 1128 wrote to memory of 1696 1128 rundll32.exe 31 PID 1128 wrote to memory of 1696 1128 rundll32.exe 31 PID 1128 wrote to memory of 1696 1128 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56c8d05c80ed174c0c4ad7ef66992664_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56c8d05c80ed174c0c4ad7ef66992664_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1696
-