Analysis
-
max time kernel
92s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/08/2024, 22:44
Static task
static1
Behavioral task
behavioral1
Sample
83d958a990f9875ec823bf14caef105c_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
83d958a990f9875ec823bf14caef105c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
83d958a990f9875ec823bf14caef105c_JaffaCakes118.dll
-
Size
80KB
-
MD5
83d958a990f9875ec823bf14caef105c
-
SHA1
1891f764c87a864703309b86509b47d41c5eca0f
-
SHA256
e6acb2ceb568d1967f8b728267615afdca34881c82a9f360cb7b9a2ae341eaf8
-
SHA512
d5b7841c2482e3d6f6b18700a2f4872f49156215cc8f1bfab0daa8557b7ecdb86eb37ecc755fa9b5edac66402d9a330cb436ede97c7e7a865ffbc29a7bf73318
-
SSDEEP
768:Ok9HVlV6Abd+/cMBucKm4gq9TzzcZWH/bbFYiZPNjQoyW+2YoA1:tbgqTzzcZsv+wPJyFoA1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1372 wrote to memory of 2672 1372 rundll32.exe 84 PID 1372 wrote to memory of 2672 1372 rundll32.exe 84 PID 1372 wrote to memory of 2672 1372 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\83d958a990f9875ec823bf14caef105c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\83d958a990f9875ec823bf14caef105c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2672
-