Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 15:17
Static task
static1
Behavioral task
behavioral1
Sample
93a1c9864d0090e055dfc3d671a143b1_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
93a1c9864d0090e055dfc3d671a143b1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
93a1c9864d0090e055dfc3d671a143b1_JaffaCakes118.dll
-
Size
27KB
-
MD5
93a1c9864d0090e055dfc3d671a143b1
-
SHA1
bf3a6896eaac1cc6a515b327501473006f9ef8ff
-
SHA256
729e390395d39db49313ad4ba98eb5670397aa7a443777b0b1bdc3d66a24d241
-
SHA512
be41f52676b39cfc466c9afd7cbe263c229e759fa0eebfc43cc725cdcce9e5b60939eb3610410d876c634a2af01205447a3ff49b24980833b303d4e178a7f4c1
-
SSDEEP
384:6ja7OXp9QXHjoNiZf16p49ttuLMGvsyDCryiRySLTu9/JkOeHQSav0Q:GaCfIgIf16psuLgyoy7JkFHBavL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2000 3056 rundll32.exe 86 PID 3056 wrote to memory of 2000 3056 rundll32.exe 86 PID 3056 wrote to memory of 2000 3056 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\93a1c9864d0090e055dfc3d671a143b1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\93a1c9864d0090e055dfc3d671a143b1_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2000
-