Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
76eabe56d01a0db524c9b9da2c1a886d_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
76eabe56d01a0db524c9b9da2c1a886d_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
76eabe56d01a0db524c9b9da2c1a886d_JaffaCakes118.dll
-
Size
103KB
-
MD5
76eabe56d01a0db524c9b9da2c1a886d
-
SHA1
bb4723f3f62158bdd990f9af01efb2ecfa440499
-
SHA256
0c7722a5fba9b8b2221aec98a1d8819fe95c98f80876d778bd8444c29bafdfcd
-
SHA512
eed8ed52804a088e1bd0d34802a9ce93149c5c869b309abd08ae5ac231192088a02ed26330a27f93da9f7ba8bf7a321d968ca91fdb7b788897a5dfa6c23b326d
-
SSDEEP
3072:M4qyvIK9uyu9E6xY5FWg78XeeYTPRvRMxGWuc2VK/Wyj6:MdynkyupKteYTP3MxmDE+I6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1224 wrote to memory of 1128 1224 rundll32.exe 84 PID 1224 wrote to memory of 1128 1224 rundll32.exe 84 PID 1224 wrote to memory of 1128 1224 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76eabe56d01a0db524c9b9da2c1a886d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\76eabe56d01a0db524c9b9da2c1a886d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1128
-