Analysis
-
max time kernel
116s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 01:36
Static task
static1
Behavioral task
behavioral1
Sample
887d180cd5241cc1758bb5f2e0de8ec4_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
887d180cd5241cc1758bb5f2e0de8ec4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
887d180cd5241cc1758bb5f2e0de8ec4_JaffaCakes118.dll
-
Size
33KB
-
MD5
887d180cd5241cc1758bb5f2e0de8ec4
-
SHA1
625c62d840ea491be550125892aea7029fa8866c
-
SHA256
9ceb8c88b15cda2488f6f941f8ac770c29267c0a9b60483ffe67e3567dfc7cf1
-
SHA512
a7af582b58d8b56b82ccf6bcd68f6bb95534407a96c3db17518c150f6f31bf8a5ad97dcb457b78b470ccc9ff0fef9a1c6afbe888dac60d9e6def19029bc407c9
-
SSDEEP
768:Yf/fosuj44q2F3FLBa7H7Qt7kZYnhYDLRKkS4:CnozB4bY7kZ0+vRKk1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1320 wrote to memory of 3252 1320 rundll32.exe 84 PID 1320 wrote to memory of 3252 1320 rundll32.exe 84 PID 1320 wrote to memory of 3252 1320 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\887d180cd5241cc1758bb5f2e0de8ec4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\887d180cd5241cc1758bb5f2e0de8ec4_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3252
-