Analysis
-
max time kernel
94s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 10:20
Static task
static1
Behavioral task
behavioral1
Sample
a2292aa0e6c60a189acc1e693f8ff7da_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a2292aa0e6c60a189acc1e693f8ff7da_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a2292aa0e6c60a189acc1e693f8ff7da_JaffaCakes118.dll
-
Size
151KB
-
MD5
a2292aa0e6c60a189acc1e693f8ff7da
-
SHA1
a345f346d9e48958ccffd061f75d9751fce07567
-
SHA256
c72d5f5706a999d9b25b08d787a239194fc63f6327f77ed6fff3688689415b63
-
SHA512
86c399ca149b85299ae257ee3f1b7ba3ee74979e23dbc8d22464cf5bd177c7c2e94fad50ae8fbbea47059212c6f687a6059dcd36ca12f69edda3b83dcea8c2f2
-
SSDEEP
3072:xOG77lItJesghXMa8EnkwjBtpBvZWhv64MnCnrnynhn8fO39V7xU95v+3mp7sNs/:baMXM1EBfBhOvzMnCnrnynhn84xos3m5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1616 wrote to memory of 3252 1616 rundll32.exe 84 PID 1616 wrote to memory of 3252 1616 rundll32.exe 84 PID 1616 wrote to memory of 3252 1616 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2292aa0e6c60a189acc1e693f8ff7da_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a2292aa0e6c60a189acc1e693f8ff7da_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3252
-