Analysis
-
max time kernel
134s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 09:33
Static task
static1
Behavioral task
behavioral1
Sample
a642d53a21088f248f839a89288f2a17_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a642d53a21088f248f839a89288f2a17_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a642d53a21088f248f839a89288f2a17_JaffaCakes118.dll
-
Size
185KB
-
MD5
a642d53a21088f248f839a89288f2a17
-
SHA1
f73781a0e83b240dc07123b741ba8d6393474991
-
SHA256
7d7813151eac7c394289e79caae92db7710d70c1ff25a5ea17b55a100a085bbd
-
SHA512
523d5831321520ed01c97c0ffa016cc12fd4788979c20a46c1df3f36f49104dffe12a4d4e0b98c28a156c8da38a42769552de1fdf4606eff13c09a38b5bde077
-
SSDEEP
3072:nVVoAYs3KjVmiL3OzQbKp4H7Daf3URDL0KbzPlWLcWkTPuISS4M:VVo2oVmiDOUbvH7e3UdYKbz0IWkLuIhd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3308 wrote to memory of 3076 3308 rundll32.exe 84 PID 3308 wrote to memory of 3076 3308 rundll32.exe 84 PID 3308 wrote to memory of 3076 3308 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a642d53a21088f248f839a89288f2a17_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a642d53a21088f248f839a89288f2a17_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3076
-