Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 22:54
Static task
static1
Behavioral task
behavioral1
Sample
8800e8517aaec6cd56278f1066e94b7c_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8800e8517aaec6cd56278f1066e94b7c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8800e8517aaec6cd56278f1066e94b7c_JaffaCakes118.dll
-
Size
137KB
-
MD5
8800e8517aaec6cd56278f1066e94b7c
-
SHA1
0bc7f77147ca3636a651d62173559bdece31d139
-
SHA256
a9ca4975789ebbd0e692e72abc18d12336a130a4875f95aa1c42fea20b503e8d
-
SHA512
f7ab82f6d26bdabd196410c059e707aaf4f18a35a1c92747a13b9825557cffab706b873e473cda264689098bed3066a1c1416e7313de412a2a2171781b8f9171
-
SSDEEP
3072:2BhE7pCpDPT8iqc1OBWtaMm9i8WSeNm+U7lDhX90:2BhMp8Dgiq5M2W74xht0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3476 wrote to memory of 548 3476 rundll32.exe 84 PID 3476 wrote to memory of 548 3476 rundll32.exe 84 PID 3476 wrote to memory of 548 3476 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8800e8517aaec6cd56278f1066e94b7c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8800e8517aaec6cd56278f1066e94b7c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:548
-