Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 11:59
Static task
static1
Behavioral task
behavioral1
Sample
73f544e787b47b01957788843f819710_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
73f544e787b47b01957788843f819710_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
73f544e787b47b01957788843f819710_JaffaCakes118.dll
-
Size
346KB
-
MD5
73f544e787b47b01957788843f819710
-
SHA1
b2bd56510b966f5c97a2b6790aaa2daee8b25566
-
SHA256
99049a26c01a07b7faf4540ea2aa187dd12d0fa2063f741fca387d0235a75bb4
-
SHA512
a71fed54a9827a95a56f0dd385c1dc6ed3b22c650efaa9c748cc271e136556476888bda4597a597d1b0c1ad62ff46de5e1da68c12c2297b0c709b7823a889c35
-
SSDEEP
3072:E82jpiC2JG7HZb7XWQml/jz8A4diTE90Q6kF4CKAYRkcj:/2L7HN7Kl/jLA90QECrYRpj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2888 wrote to memory of 3476 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 3476 2888 rundll32.exe rundll32.exe PID 2888 wrote to memory of 3476 2888 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73f544e787b47b01957788843f819710_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73f544e787b47b01957788843f819710_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3476