Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 01:29
Behavioral task
behavioral1
Sample
9f0cf08aab0dda4ffdb3b79f7552bc43_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
9f0cf08aab0dda4ffdb3b79f7552bc43_JaffaCakes118.dll
-
Size
51KB
-
MD5
9f0cf08aab0dda4ffdb3b79f7552bc43
-
SHA1
9d05419f59ddac0c9f18b9e4eb85fcd2850e4c8f
-
SHA256
05bb37b941e39fe88bf19fbedd57e1170a0b9861998f0e4d9eca4a27dff7444c
-
SHA512
f375db98db453a32aeed09318ee8fbddf8bc0ce791dfc51061948cb718e62c1a80c195dac0551d472af770edc92c28fcec6fe8815b3f60f061a1af125a147868
-
SSDEEP
1536:grl1KpEM/by4QkNaUCHYOaHtVxuFBpDTU:grlpGyZkNaUCHY4pk
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2056-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 4644 wrote to memory of 2056 4644 rundll32.exe rundll32.exe PID 4644 wrote to memory of 2056 4644 rundll32.exe rundll32.exe PID 4644 wrote to memory of 2056 4644 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f0cf08aab0dda4ffdb3b79f7552bc43_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9f0cf08aab0dda4ffdb3b79f7552bc43_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2056
-