Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
82e3845112e8f99ff582324812970c8f_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
82e3845112e8f99ff582324812970c8f_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
82e3845112e8f99ff582324812970c8f_JaffaCakes118.dll
-
Size
88KB
-
MD5
82e3845112e8f99ff582324812970c8f
-
SHA1
50ec404dcb073a7b84d381abd7072679b239c454
-
SHA256
d7d668df112dc5fb4e7ce42a112ee20f7047e970c6a6650ad773ef60a5a86c3c
-
SHA512
a76e1cd01905b874374c659f5116fd08143bc1662bc30a59e8d19b019c4771cf23eb9aaf582f5420d83fe095ebae701f115d350dc3beaa8cf963feb2bed2b050
-
SSDEEP
1536:opNmw3LuwI/dlZoGFqmTj22IoxtAhqX+Tdmr/AX5uVBQSDJlqrJ+:krWXvjTj28xsqXEia5kBhDJlqrJ+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3224 wrote to memory of 3320 3224 rundll32.exe 83 PID 3224 wrote to memory of 3320 3224 rundll32.exe 83 PID 3224 wrote to memory of 3320 3224 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82e3845112e8f99ff582324812970c8f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\82e3845112e8f99ff582324812970c8f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3320
-