Analysis
-
max time kernel
134s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 14:45
Static task
static1
Behavioral task
behavioral1
Sample
747d52d217337d4e0bd63e5b648d394d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
747d52d217337d4e0bd63e5b648d394d_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
747d52d217337d4e0bd63e5b648d394d_JaffaCakes118.dll
-
Size
32KB
-
MD5
747d52d217337d4e0bd63e5b648d394d
-
SHA1
e7aabe6580e437ff76e643dbc1240da6c509cbc9
-
SHA256
7cb276605a1de37ecd1fcb357197893cbcf1f072f8bc2837866d719dc4c2c2a9
-
SHA512
56799c77ff318a0b32ef18f891fa59eb3e6d8ddd4a9e9794bb1617302b276cd591c77abc888d629569a190c358ae6884a20ac42ce6f80b556a419902195b95f3
-
SSDEEP
768:2dZfKcCBEerp5OFlm7A4oknszhqDINR9mQCp7mX:2dZlCRrKa7AHFkUNRZCc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 624 wrote to memory of 2676 624 rundll32.exe 84 PID 624 wrote to memory of 2676 624 rundll32.exe 84 PID 624 wrote to memory of 2676 624 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\747d52d217337d4e0bd63e5b648d394d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\747d52d217337d4e0bd63e5b648d394d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2676
-