Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
a6e4b09fcebd94ee12e631027830abb9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a6e4b09fcebd94ee12e631027830abb9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a6e4b09fcebd94ee12e631027830abb9_JaffaCakes118.dll
-
Size
32KB
-
MD5
a6e4b09fcebd94ee12e631027830abb9
-
SHA1
f4a65aa5f1445c30af2bbddc10723928aa011375
-
SHA256
3d9e3bf4a097ac3f087bda3289bd382c011c3ee4402d648d8aca78f0a8fcc0c1
-
SHA512
16848d4fcc5aa89ac83dc46cf230b26b200b7d069fe38bc59955dde32883b560f00303e288956213c285825d0c83093241a9595f75cd3d3f1037d97a6c95803c
-
SSDEEP
768:w24K7MjWs6CKSbjsFk+7grzrDN1hVf6ZyZs/A:w24cY5KSs7gHrDrHUyZsI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4376 wrote to memory of 4744 4376 rundll32.exe 83 PID 4376 wrote to memory of 4744 4376 rundll32.exe 83 PID 4376 wrote to memory of 4744 4376 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6e4b09fcebd94ee12e631027830abb9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a6e4b09fcebd94ee12e631027830abb9_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4744
-