Analysis
-
max time kernel
139s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 11:34
Static task
static1
Behavioral task
behavioral1
Sample
78116e0866fab91b870bb43f1cb98c92_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
78116e0866fab91b870bb43f1cb98c92_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
78116e0866fab91b870bb43f1cb98c92_JaffaCakes118.dll
-
Size
108KB
-
MD5
78116e0866fab91b870bb43f1cb98c92
-
SHA1
b74de469e3d4881adcef67da4270559686da31ad
-
SHA256
0b693cb874db79df8c8e063cde6747ed110b9870517e6d6adabb7c9a2c8b3eb4
-
SHA512
78ca3545303e1393197ad329d8015a719b6504f907bfeb826af37e6532aa44cf708a7f5f009bc9c504c514a0d9dd9cc7c56f6212a2b5330b44f22d038da66471
-
SSDEEP
1536:OCI3FjWuBzBjrgPSahF2Q/XQ74tfPrz/zxtCYyq1h1vc8y0weJq45BSlxEwo:cC01jrahF2Q/QyfPr/Lj13hy0wehhw
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1008 wrote to memory of 368 1008 rundll32.exe 84 PID 1008 wrote to memory of 368 1008 rundll32.exe 84 PID 1008 wrote to memory of 368 1008 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\78116e0866fab91b870bb43f1cb98c92_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\78116e0866fab91b870bb43f1cb98c92_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:368
-