Analysis
-
max time kernel
93s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 14:36
Static task
static1
Behavioral task
behavioral1
Sample
8abe33b0bb83b3fb3ce063676205f4f0_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8abe33b0bb83b3fb3ce063676205f4f0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8abe33b0bb83b3fb3ce063676205f4f0_JaffaCakes118.dll
-
Size
36KB
-
MD5
8abe33b0bb83b3fb3ce063676205f4f0
-
SHA1
f8f24064ce9eb304c28dad1a7288c11f46584b20
-
SHA256
1b7589f67f8b9e5756ad4f31496ba048bb1e09a7f6ba013908cbb4c005a4fcfe
-
SHA512
ecb6640e55db8a1572d3c244c1a54838901266404869c838b4c3e7b72336f974ac34fb3afb4692d4735c889a6766729764876b705a8a5f331f9b954a74e00449
-
SSDEEP
768:yldjeazLJ73PSindj9tuVqFqH7Pdvlr5hCD8ROgx:yjjeUJ73PRtuVq67F9lQgROy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2468 wrote to memory of 564 2468 rundll32.exe 83 PID 2468 wrote to memory of 564 2468 rundll32.exe 83 PID 2468 wrote to memory of 564 2468 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8abe33b0bb83b3fb3ce063676205f4f0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8abe33b0bb83b3fb3ce063676205f4f0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:564
-