Analysis
-
max time kernel
94s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
81c4acd9fa6210d49e5c2f5809deb060_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81c4acd9fa6210d49e5c2f5809deb060_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
81c4acd9fa6210d49e5c2f5809deb060_JaffaCakes118.dll
-
Size
49KB
-
MD5
81c4acd9fa6210d49e5c2f5809deb060
-
SHA1
2d88cd1838fe0fec6ebf26849932da4aeab510f9
-
SHA256
420a5475de0ef90a738b65031f470c5fff9c27baa3abee2fadda51ce6e9945f2
-
SHA512
5d489bbc0f4c82306f6afd3aa34c9704a898b311792b5464e5ae58a6fc0ab1cfabeae4a3e3293bdce1894a32bcb7029a41b1b1524c4fea488fb981c1a702ef71
-
SSDEEP
768:c3niJqLQbLyBwSheSFIWre97mbv7pAar2JxJq10BsplRn3Bi4ytMwM34FI7oa8x:c3iJqLQf2mWE8v7owpnQ6Z3+jx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4796 wrote to memory of 1064 4796 rundll32.exe 83 PID 4796 wrote to memory of 1064 4796 rundll32.exe 83 PID 4796 wrote to memory of 1064 4796 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81c4acd9fa6210d49e5c2f5809deb060_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81c4acd9fa6210d49e5c2f5809deb060_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1064
-