Analysis
-
max time kernel
92s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
706fcd9f5e35c3475a54c38b7f1a8796_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
706fcd9f5e35c3475a54c38b7f1a8796_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
706fcd9f5e35c3475a54c38b7f1a8796_JaffaCakes118.dll
-
Size
19KB
-
MD5
706fcd9f5e35c3475a54c38b7f1a8796
-
SHA1
130881cd099a3ae07d795aff56f4ae466c1b41a8
-
SHA256
064ab2d31240dc88eb3301238a6083138f4d4b7656b54c97be6e1c2aa24663c3
-
SHA512
47fc7bcc495cb56e5d0f4f4a1e158ef25657c3056a292111eedcefbb0e0ff1116255511fc52bd88e056e7c6cd70e75f6c3ae04b0ea4978de1df00a682dd4508b
-
SSDEEP
384:vu2FfFQHnjmKvieAeS8ePoIks3X4Z/Uz+KKLy6g8:vu2FNQHCetewIjH4Z/UzVKLy6l
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3724 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2232 wrote to memory of 3724 2232 rundll32.exe 86 PID 2232 wrote to memory of 3724 2232 rundll32.exe 86 PID 2232 wrote to memory of 3724 2232 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\706fcd9f5e35c3475a54c38b7f1a8796_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\706fcd9f5e35c3475a54c38b7f1a8796_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3724
-