Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
89d8f09aad54609d572ea04ce7b58af0_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
89d8f09aad54609d572ea04ce7b58af0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
89d8f09aad54609d572ea04ce7b58af0_JaffaCakes118.dll
-
Size
90KB
-
MD5
89d8f09aad54609d572ea04ce7b58af0
-
SHA1
968c382724a5e5b5f73635615fc6eb704b8a41a4
-
SHA256
3da445b27417c2bc5a8b4f68411b5d6f8fdd1e1b835f33c14154c07ff5c1dbe9
-
SHA512
73375d5143a8f2c18727fbbb6f6eef0905ba4a22f77b746689d693d972343b3632ab8a03263199994feded623f1a37c740c14508dd2e6d80daf2e9c75014e192
-
SSDEEP
1536:Udb3QNY+TMWnfq4epeOY7VUCAC0joURwD/K7wDRbyIJfktbCkvc2qZ5J:UdzQNDTBCHped10Dw7lWYucD5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4616 rundll32.exe 4616 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2600 wrote to memory of 4616 2600 rundll32.exe 84 PID 2600 wrote to memory of 4616 2600 rundll32.exe 84 PID 2600 wrote to memory of 4616 2600 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89d8f09aad54609d572ea04ce7b58af0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89d8f09aad54609d572ea04ce7b58af0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4616
-