Analysis
-
max time kernel
135s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 20:50
Static task
static1
Behavioral task
behavioral1
Sample
712e46f2b2cb40b9013292147b14bf18_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
712e46f2b2cb40b9013292147b14bf18_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
712e46f2b2cb40b9013292147b14bf18_JaffaCakes118.dll
-
Size
68KB
-
MD5
712e46f2b2cb40b9013292147b14bf18
-
SHA1
02074c95e953c38320686e644a24b32e2cac1e07
-
SHA256
900f2ee7a04560da2f4773f5762e7bf9ce28eca928fed2ed59f38dc15d89adf8
-
SHA512
8da0d7e4521b446420040c5bb0e77959f438cd800daef4aa988b91a4b7f3cbc7f3f10203195491825b529f5cbb1000f8befe07d6ca942cf2a4fd95aa5c20c2b9
-
SSDEEP
1536:t7nOk9FRfgxtmG+8nsfVk4JxsKuTCrpypTLhje/09HQE:VOuDgxtz4kctpUh6M9wE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2964 wrote to memory of 3340 2964 rundll32.exe 86 PID 2964 wrote to memory of 3340 2964 rundll32.exe 86 PID 2964 wrote to memory of 3340 2964 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\712e46f2b2cb40b9013292147b14bf18_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\712e46f2b2cb40b9013292147b14bf18_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3340
-