Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 07:02
Behavioral task
behavioral1
Sample
a5d2a4e1e267cdece7c79bff60f7c8eb_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a5d2a4e1e267cdece7c79bff60f7c8eb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a5d2a4e1e267cdece7c79bff60f7c8eb_JaffaCakes118.dll
-
Size
405KB
-
MD5
a5d2a4e1e267cdece7c79bff60f7c8eb
-
SHA1
c74b8b30b50340f6598b33075c821c4d7ebdb6c3
-
SHA256
5911ca8251a1f24bd5c5c6bc4f8216513c3a16bcb41f1d0499b060702b83802c
-
SHA512
cb166fdbc5325d0d1093eaf4f90d7a27431a1c919fda6239bca52151d04dd413b4a38f0f4c805240780072dabbcbc484f74d367596f63d02e5949f25c5ffcd8f
-
SSDEEP
12288:iDuDt1q67efy5BvV5vbLsWesVbqWA1CCNHug2BL:iotAGegFbLp9V2nCuHug2BL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1676 wrote to memory of 4492 1676 rundll32.exe 84 PID 1676 wrote to memory of 4492 1676 rundll32.exe 84 PID 1676 wrote to memory of 4492 1676 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5d2a4e1e267cdece7c79bff60f7c8eb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5d2a4e1e267cdece7c79bff60f7c8eb_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4492
-