Analysis
-
max time kernel
132s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
a802c85f12e8c4ecb1b8dfd8efedc285_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a802c85f12e8c4ecb1b8dfd8efedc285_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a802c85f12e8c4ecb1b8dfd8efedc285_JaffaCakes118.dll
-
Size
990KB
-
MD5
a802c85f12e8c4ecb1b8dfd8efedc285
-
SHA1
ee8599641381cddf8936f96f832bc40251ed0067
-
SHA256
eb3d2c90a55e9de75e904acb31ebc64665e2fe1b7a335a9a47be363a02443bee
-
SHA512
eafad35fac0645f47bd585046337cd57f7bfe48fe743e39ccae4c62300899bb8d3f059a29e717420a950d12376d45e1f58ebf80a9248ee77fbd7cf77a6667c39
-
SSDEEP
12288:hdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlCkdlk:
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4464 wrote to memory of 1576 4464 rundll32.exe 87 PID 4464 wrote to memory of 1576 4464 rundll32.exe 87 PID 4464 wrote to memory of 1576 4464 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a802c85f12e8c4ecb1b8dfd8efedc285_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a802c85f12e8c4ecb1b8dfd8efedc285_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1576
-