Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 12:13
Static task
static1
Behavioral task
behavioral1
Sample
a27bfd81b60c5b7ab68b3e1de7d1d6a4_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a27bfd81b60c5b7ab68b3e1de7d1d6a4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a27bfd81b60c5b7ab68b3e1de7d1d6a4_JaffaCakes118.dll
-
Size
1.0MB
-
MD5
a27bfd81b60c5b7ab68b3e1de7d1d6a4
-
SHA1
55b9a726e1074d7f586a750123abcd3b696d75cc
-
SHA256
257f7f24ac035ba6f49a63679e175576224dc72a6bfff27e3aff99a9e0d40c61
-
SHA512
fb6f05ab54e5f068e04d07fb4b5520d8a9db60fd6e7be1d5e5c44ff31a0cd4450944a8a3f85554cdff637a78b07df861e161b6cf3c687f038d0927f531913777
-
SSDEEP
24576:wQN60LA3NE9tKT17UJKW/SYv6vxHBaVGyBknm:wQNUNyO16uvqkm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2756 2536 rundll32.exe 85 PID 2536 wrote to memory of 2756 2536 rundll32.exe 85 PID 2536 wrote to memory of 2756 2536 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a27bfd81b60c5b7ab68b3e1de7d1d6a4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a27bfd81b60c5b7ab68b3e1de7d1d6a4_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2756
-