Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 17:24
Static task
static1
Behavioral task
behavioral1
Sample
6883bc81350482e5397a65934504b19e_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6883bc81350482e5397a65934504b19e_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6883bc81350482e5397a65934504b19e_JaffaCakes118.dll
-
Size
245KB
-
MD5
6883bc81350482e5397a65934504b19e
-
SHA1
d9209fa329b44b6c8856c57c801c73d9dc2fb61b
-
SHA256
0d7867c1d8b75214fd75d33c4a48a42ab3d254c5b248b0874acd125f38bf8c80
-
SHA512
63e6905aece4f160291dbfb2e1d724298408fdb80d3af7575f9596045d9960046578a8b7473e27c0924a3d58165bacfd6d3d29ab385b4641afa2443925bf21e4
-
SSDEEP
6144:ZdMJ8kW+AvBMG6G38m4T+957YVJqtgsKj8GsUqlc:y8kW+AeG6GMmhHSqGsKjN7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 944 wrote to memory of 3544 944 rundll32.exe 83 PID 944 wrote to memory of 3544 944 rundll32.exe 83 PID 944 wrote to memory of 3544 944 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6883bc81350482e5397a65934504b19e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6883bc81350482e5397a65934504b19e_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3544
-