Analysis
-
max time kernel
142s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 12:32
Static task
static1
Behavioral task
behavioral1
Sample
6f966f4a84b5c108202424690c3ddea5_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6f966f4a84b5c108202424690c3ddea5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6f966f4a84b5c108202424690c3ddea5_JaffaCakes118.dll
-
Size
33KB
-
MD5
6f966f4a84b5c108202424690c3ddea5
-
SHA1
1756d0955ca9dac91c36bb5da3d1b15c6f199e91
-
SHA256
2dda729d6acf140d9a5f8ff219956c0108520552b77765a90904b81322cb74e1
-
SHA512
e1869262deb11beffe5e325e5614bc396940d1ecf805d2255f2722aab57659249bd99012cb04bf7dbd7986a9ff382c32523037a1fb4b9d7442594df7512af131
-
SSDEEP
768:HSn1bTS2JZHNZCyxpzm7N6X7Lfdhh5hcD/4s+pR3zS2TkET:HSn1bTSypSu7LFhzC8s+pRjIY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3536 wrote to memory of 4492 3536 rundll32.exe 84 PID 3536 wrote to memory of 4492 3536 rundll32.exe 84 PID 3536 wrote to memory of 4492 3536 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6f966f4a84b5c108202424690c3ddea5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6f966f4a84b5c108202424690c3ddea5_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4492
-