Analysis
-
max time kernel
139s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
8ab7f91a3b64ad4b521f15539b7fcf12_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8ab7f91a3b64ad4b521f15539b7fcf12_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8ab7f91a3b64ad4b521f15539b7fcf12_JaffaCakes118.dll
-
Size
7KB
-
MD5
8ab7f91a3b64ad4b521f15539b7fcf12
-
SHA1
754e32cbe98508d64bdcc116e50b16711fc4cace
-
SHA256
4f1c6abc195e01eaa1e7b46ce202a8f512c8cb0c55c76b69c7868975ba199005
-
SHA512
a5d411196f062543547212d184a97728e230fc38dea72f93d3871fe0caa8b2108343d0c0e87a6d4d1ffdc3755f90123255c789f628d49d813248b34a8615e37d
-
SSDEEP
96:nPI4WiJu8aFwiFtih01Rl532eJWahK4oDImBxo3Ie:ndW0u8/Jh0Dl532eJWao4i/De
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1084 wrote to memory of 3792 1084 rundll32.exe 86 PID 1084 wrote to memory of 3792 1084 rundll32.exe 86 PID 1084 wrote to memory of 3792 1084 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ab7f91a3b64ad4b521f15539b7fcf12_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8ab7f91a3b64ad4b521f15539b7fcf12_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3792
-