Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 09:11
Static task
static1
Behavioral task
behavioral1
Sample
89cbdeef3c93f73983e36695502d6568_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
89cbdeef3c93f73983e36695502d6568_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
89cbdeef3c93f73983e36695502d6568_JaffaCakes118.dll
-
Size
120KB
-
MD5
89cbdeef3c93f73983e36695502d6568
-
SHA1
3f99a6d8a8a941f7b5ada637e0a0bcb4259edcb8
-
SHA256
e3e021bb536421a1c8fd4722d193fb311a771385167985a63c701fa263b42db1
-
SHA512
8b6bd5eecf92dce760050398634664f6aa9954a048f93e5646372885697c63c7225a161924358b6a1cf814800e6e24de36a3628a55204963b0642e6abdbc59d7
-
SSDEEP
3072:/glOWHkPcbv+kAFg5H/36tjv5tBZ7ULFHqukkkkfkkkk4kkkZkkf:/glOOktFe3WvlZ7mkkkkfkkkk4kkkZkM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1496 wrote to memory of 516 1496 rundll32.exe 84 PID 1496 wrote to memory of 516 1496 rundll32.exe 84 PID 1496 wrote to memory of 516 1496 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89cbdeef3c93f73983e36695502d6568_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89cbdeef3c93f73983e36695502d6568_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:516
-