Analysis
-
max time kernel
95s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
776bb8dd778ca08532d8ed05c54155ed_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
776bb8dd778ca08532d8ed05c54155ed_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
776bb8dd778ca08532d8ed05c54155ed_JaffaCakes118.dll
-
Size
8KB
-
MD5
776bb8dd778ca08532d8ed05c54155ed
-
SHA1
039440ba95a8357bdfcee799a96d2391f6db2479
-
SHA256
1d08ca087e9057414c31f5b558cc84c1b751732a68efe3a61d9d3314e5fb9e53
-
SHA512
09d455f38d4453b3598178d68d9ac3077b0ea5d147d189edc9ef322cf06e8adc4ec54257decb76ce2920e5cca448abfa977be5e90ca14d2eadf124f263b043a2
-
SSDEEP
192:14x1IAuSU3jxND+cTVlylG3XucqE5OAp:14x16HzzD+cRlyc+HA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2988 2376 rundll32.exe 83 PID 2376 wrote to memory of 2988 2376 rundll32.exe 83 PID 2376 wrote to memory of 2988 2376 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\776bb8dd778ca08532d8ed05c54155ed_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\776bb8dd778ca08532d8ed05c54155ed_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2988
-