Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
a8009c9942d73b426024725649de3dd4_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a8009c9942d73b426024725649de3dd4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a8009c9942d73b426024725649de3dd4_JaffaCakes118.dll
-
Size
126KB
-
MD5
a8009c9942d73b426024725649de3dd4
-
SHA1
945911a8578ca93f6f757b26a310e68c05b89e19
-
SHA256
4cbd8f1ecffe57d6857e4910f5159dea90cc01cd2e0a57daaf9ca4481fe690c5
-
SHA512
b0d85289160e5c9a5e6b1d164479fc33e58c1c8dd42146dbe817094beef64a4075ab664c574c6f6df6264dc45796ac2a1169a8132cf377c7183c7fe68ae6ac9e
-
SSDEEP
3072:MdEHXundA3hnJWDrezjlRMIWgUILao/s6w3Zb2nZ:THp0azjjIgUIGpG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4988 wrote to memory of 3324 4988 rundll32.exe 84 PID 4988 wrote to memory of 3324 4988 rundll32.exe 84 PID 4988 wrote to memory of 3324 4988 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a8009c9942d73b426024725649de3dd4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a8009c9942d73b426024725649de3dd4_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3324
-