Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 15:54
Static task
static1
Behavioral task
behavioral1
Sample
86b1d7f4bde56c4d201ed377e11427b9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
86b1d7f4bde56c4d201ed377e11427b9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
86b1d7f4bde56c4d201ed377e11427b9_JaffaCakes118.dll
-
Size
832KB
-
MD5
86b1d7f4bde56c4d201ed377e11427b9
-
SHA1
7838d96e2b7dd08be19463d8256d3161dc176584
-
SHA256
ee6acd212b77db2f9c6e37c705790bc93f7a6c7abc7fb3b60a4ecd25de101434
-
SHA512
a9f0b6c491c58aa2a30d789b407989a15be5facde1e423218a1c870bf2fe7367728e4e6aef8f455658d36a3e14344637f5528828c2691a7ace9f5597a5d6cb60
-
SSDEEP
12288:1tp9S0iG/iPz5Z2w2IDYRIOMQvVheWc0ZNZrG3ox3JszhEZkOG:/PR/i12sNRKVheX0ZNZ0UCzqZkN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5020 wrote to memory of 5008 5020 rundll32.exe 84 PID 5020 wrote to memory of 5008 5020 rundll32.exe 84 PID 5020 wrote to memory of 5008 5020 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\86b1d7f4bde56c4d201ed377e11427b9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\86b1d7f4bde56c4d201ed377e11427b9_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5008
-