Analysis
-
max time kernel
93s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
81c951ceb2eeb2ff5ab75c61f038903b_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81c951ceb2eeb2ff5ab75c61f038903b_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
81c951ceb2eeb2ff5ab75c61f038903b_JaffaCakes118.dll
-
Size
103KB
-
MD5
81c951ceb2eeb2ff5ab75c61f038903b
-
SHA1
9903b53c41c693a29ab00ae37657ae1337377493
-
SHA256
2efc2685cd3b3284f5f2dca03aef002267fcc3ae96062d516819c3c920dce2f8
-
SHA512
3255bd36cbb49b724c7f62e5f188070f009e115c509e4a9a0ac71744752fc8c7ff6aab9ce3b0b618ec52dc77b681f25862b94ad2225c3f2036b9eaa879605756
-
SSDEEP
1536:xlai+2m2TDQI6+AApU/GRGSH9neRkNpRmCDyU0KGANwV4iNUcOPbVlP9X/:x1UIkApU/9GnemRJ0JEI3OzVlP9P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2340 wrote to memory of 3580 2340 rundll32.exe 82 PID 2340 wrote to memory of 3580 2340 rundll32.exe 82 PID 2340 wrote to memory of 3580 2340 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81c951ceb2eeb2ff5ab75c61f038903b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81c951ceb2eeb2ff5ab75c61f038903b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3580
-