Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
6a91b8bfa0d1f6c621dbfb99652c7925_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6a91b8bfa0d1f6c621dbfb99652c7925_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6a91b8bfa0d1f6c621dbfb99652c7925_JaffaCakes118.dll
-
Size
20KB
-
MD5
6a91b8bfa0d1f6c621dbfb99652c7925
-
SHA1
fdc9705d9474ecd1b235a88cf55758054b52f8c0
-
SHA256
fbd14d74724d917bd814ac255bd0dd017c738218fe977a097216282854ee13e3
-
SHA512
d361c959e1f107c15bbf07146d17e0ef9711740b5a167fbb0e251180f60d6d90ed9315c19e6daa169b2534fe3d58ef7bc9db916d17dbbcc49ff14aef0b454377
-
SSDEEP
384:ibRQ9KaonyPqMUgonedhBUtbrUa4oDTUkJddsO99eSJXhAH0j4:iQKzyPqMkejBwnUa5DTBSa9jJxAH0M
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3488 wrote to memory of 1824 3488 rundll32.exe 84 PID 3488 wrote to memory of 1824 3488 rundll32.exe 84 PID 3488 wrote to memory of 1824 3488 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a91b8bfa0d1f6c621dbfb99652c7925_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a91b8bfa0d1f6c621dbfb99652c7925_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1824
-