Analysis
-
max time kernel
90s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
75ca0571891a54b8043502f482af4890_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
75ca0571891a54b8043502f482af4890_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
75ca0571891a54b8043502f482af4890_JaffaCakes118.dll
-
Size
757KB
-
MD5
75ca0571891a54b8043502f482af4890
-
SHA1
3e968e830f505ae8ca45d7f53b3b1b387b61b7f4
-
SHA256
b36f15833ef2a0a03c81b95fe404366f0ab6099a21e83ebbb851c558e6101725
-
SHA512
87b0e31e1d35406aa73dd4a9543d4d74f1bb0062d547282f55d80247538ce227621bafbed43945147a4fe5d1348d9c40ff17465ef57e49ac975b7dc87e9c7ed5
-
SSDEEP
1536:Cm9SFhKo4848484848484848484848484848484848484848484848484848484I:ClKE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1764 wrote to memory of 2060 1764 rundll32.exe 84 PID 1764 wrote to memory of 2060 1764 rundll32.exe 84 PID 1764 wrote to memory of 2060 1764 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75ca0571891a54b8043502f482af4890_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\75ca0571891a54b8043502f482af4890_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2060
-