Analysis
-
max time kernel
130s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2024 06:54
Static task
static1
Behavioral task
behavioral1
Sample
6aa4942db434d33e86e2ee8c42a06195_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6aa4942db434d33e86e2ee8c42a06195_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6aa4942db434d33e86e2ee8c42a06195_JaffaCakes118.dll
-
Size
132KB
-
MD5
6aa4942db434d33e86e2ee8c42a06195
-
SHA1
bff6f5b00e726a30c9cdbeeebc5295618608acb9
-
SHA256
9e36aa87f53653b3576ab6646d7fada4de38bc7cdcba6bfd48c539cec79f7130
-
SHA512
8c7ef3ad3590dafa7b2062cb76c09ec1870b86d86987db51e79fa561183d99224f8d0d1f733e87078fc4a2152cdbff5707a7c0999f361941a2ea4dc5bbf87484
-
SSDEEP
3072:cf7sMi1Hr3cnPJgk2gDR5wDlBkQvrx6V09S+Dg:aiD34R5wDlDDxC06
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4852 wrote to memory of 1464 4852 rundll32.exe 84 PID 4852 wrote to memory of 1464 4852 rundll32.exe 84 PID 4852 wrote to memory of 1464 4852 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6aa4942db434d33e86e2ee8c42a06195_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6aa4942db434d33e86e2ee8c42a06195_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1464
-