Analysis
-
max time kernel
136s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 09:09
Static task
static1
Behavioral task
behavioral1
Sample
779da9a25c73daa7c4830fc17984ce90_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
779da9a25c73daa7c4830fc17984ce90_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
779da9a25c73daa7c4830fc17984ce90_JaffaCakes118.dll
-
Size
40KB
-
MD5
779da9a25c73daa7c4830fc17984ce90
-
SHA1
a1113ed0828a4e0ebaadc4d9f119c37434338eb3
-
SHA256
f85a380197deee5b4f45da6704afda1e8044ba71d8f811f4ac419eb3f47ff945
-
SHA512
097df2bfc78262e1b8862abc5261f74041d622cda25455c70c32dd3f9c339d326827aa619209656ad96ef8b10485a68a043688e95a9226985560cfd6e93e1787
-
SSDEEP
768:9lPHgFEwWZLvKzU7kAG7066tX+hP6jWBoRv5p3:9lvg0KzUQn7066tuhyaoRRl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2976 wrote to memory of 3440 2976 rundll32.exe 84 PID 2976 wrote to memory of 3440 2976 rundll32.exe 84 PID 2976 wrote to memory of 3440 2976 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\779da9a25c73daa7c4830fc17984ce90_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\779da9a25c73daa7c4830fc17984ce90_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3440
-