Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 13:54
Static task
static1
Behavioral task
behavioral1
Sample
8efaeb92e0a9eaff0bb6f412b707e7cf_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8efaeb92e0a9eaff0bb6f412b707e7cf_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8efaeb92e0a9eaff0bb6f412b707e7cf_JaffaCakes118.dll
-
Size
45KB
-
MD5
8efaeb92e0a9eaff0bb6f412b707e7cf
-
SHA1
f19530d76cd109fd2b994f0d6cbf0b6de389bc55
-
SHA256
745b8e0c4537323f64d7d27e106595af445f4d93bf56eef9359d1a00f266e1e0
-
SHA512
f93841ecf260bbc9f5fe9298bcabb2d6d12a5cfd31dbc52af9c73d58350f7cd6caeebf351e411df015398ccc88758a9ac92ec51f4ae7985e6f73b4a819efdc03
-
SSDEEP
768:WdDKzyTl0f6SJGYVhU8qhy/Sxw3ohmMwGkVaglYDcgr7a6ZTSimj1:WNIyOLGYVhmU/D4hmMRsml7agTSj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1948 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1900 wrote to memory of 1948 1900 rundll32.exe 30 PID 1900 wrote to memory of 1948 1900 rundll32.exe 30 PID 1900 wrote to memory of 1948 1900 rundll32.exe 30 PID 1900 wrote to memory of 1948 1900 rundll32.exe 30 PID 1900 wrote to memory of 1948 1900 rundll32.exe 30 PID 1900 wrote to memory of 1948 1900 rundll32.exe 30 PID 1900 wrote to memory of 1948 1900 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8efaeb92e0a9eaff0bb6f412b707e7cf_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8efaeb92e0a9eaff0bb6f412b707e7cf_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1948
-