Analysis
-
max time kernel
139s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 20:57
Static task
static1
Behavioral task
behavioral1
Sample
94b4d4618a6b6fa865dc721f934c67d1_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
94b4d4618a6b6fa865dc721f934c67d1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
94b4d4618a6b6fa865dc721f934c67d1_JaffaCakes118.dll
-
Size
36KB
-
MD5
94b4d4618a6b6fa865dc721f934c67d1
-
SHA1
48770f371917d6a395f401123aae29f8e442a889
-
SHA256
4888b1365feb99201b0bec696b5d07d7573911e3388dd955e8fff64d409a6979
-
SHA512
09fad89c3030eb2fe23fec96213b422810268170fd6119df7ce45cfdccf31672928c8483b7ec61c745873905f9604281224ff1536eae51f7259a6a71004564fc
-
SSDEEP
768:T55nNYbDdfxBdYpEcYoV31dN7OuT1hE95hND9RVVAMuV:T3NcDdfxP2YoV3h7BpYvRRVVAMg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1896 wrote to memory of 4984 1896 rundll32.exe 84 PID 1896 wrote to memory of 4984 1896 rundll32.exe 84 PID 1896 wrote to memory of 4984 1896 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94b4d4618a6b6fa865dc721f934c67d1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94b4d4618a6b6fa865dc721f934c67d1_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4984
-