Analysis
-
max time kernel
94s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
717c5d29e0b22e1696f33afab5e24215_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
717c5d29e0b22e1696f33afab5e24215_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
717c5d29e0b22e1696f33afab5e24215_JaffaCakes118.dll
-
Size
28KB
-
MD5
717c5d29e0b22e1696f33afab5e24215
-
SHA1
8aa398e23b293bf27a3809769e801fbefbcb06b6
-
SHA256
6d900703ce9742f84cc05cbbea7c6d7cc7af363259d35937dfe6911f9d9668eb
-
SHA512
85bf845544617ec7785f48f99e7580019ac221843638cc27e5400c8bde77ea888e59fbe678bec86e674da06a1b9aadb6e939ebf5627d10006a72f88ecaa8924b
-
SSDEEP
384:d/EgRrcHbjyVzgoh3uT602s1xCV0YWBJ9H0yoxb8Z85RSqCuAN:d/jREbWuoheT602QAVEt0y1BHuAN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3812 wrote to memory of 3896 3812 rundll32.exe 84 PID 3812 wrote to memory of 3896 3812 rundll32.exe 84 PID 3812 wrote to memory of 3896 3812 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\717c5d29e0b22e1696f33afab5e24215_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\717c5d29e0b22e1696f33afab5e24215_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3896
-