Analysis
-
max time kernel
132s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 04:26
Static task
static1
Behavioral task
behavioral1
Sample
770c90315819e8224dafb4ce298a606f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
770c90315819e8224dafb4ce298a606f_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
770c90315819e8224dafb4ce298a606f_JaffaCakes118.dll
-
Size
88KB
-
MD5
770c90315819e8224dafb4ce298a606f
-
SHA1
69f3f03e7a97106191b4a4d33b2034260074be20
-
SHA256
e53337d64eb5c0b6d02177491b4ef03f86211652080b064c96fc67a635958f67
-
SHA512
65c1528991f270fafcd5a245c96b5fcd2373cd951848c214af8665a28fa4c224fe997638c3eca1eb2f3240638d1dddbed25cb72c3567a8a7e1cdd5520a92ffce
-
SSDEEP
1536:olk8wlQH7dgKSbEF8S2a44jxqPfKQo1fTczT7GfgIKA84:oyLlQH7dfSY+S2a4+xqPfKQoNYTifdnH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 468 wrote to memory of 3232 468 rundll32.exe 84 PID 468 wrote to memory of 3232 468 rundll32.exe 84 PID 468 wrote to memory of 3232 468 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\770c90315819e8224dafb4ce298a606f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\770c90315819e8224dafb4ce298a606f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3232
-