Analysis
-
max time kernel
139s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 22:01
Static task
static1
Behavioral task
behavioral1
Sample
acc12885d0b2975a338175189dd507e7_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
acc12885d0b2975a338175189dd507e7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
acc12885d0b2975a338175189dd507e7_JaffaCakes118.dll
-
Size
32KB
-
MD5
acc12885d0b2975a338175189dd507e7
-
SHA1
0a10458ff2b1d453f05b0c7c68e90dd0a20e23c0
-
SHA256
67e67d100533e850c74947acce52df3495c05fd3ccec82b3b1320ec40e86664f
-
SHA512
f9c3268af74b8dfb462bb5f17f067e17c0b3a84f7d6f0abb21e51f78d480a272a8c4b2beeff9ac83abf20a8bb338cb9360a1fed90355e92bebed4234ca252a17
-
SSDEEP
384:qUIsK3EA9NMG5YBPUi9MY9zoDpb77+/VZSXGQG9aFJFrWCRIFs1p:GsKUTeos4MY9zqb7QZkGZ96BTRIO1p
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2424 wrote to memory of 3096 2424 rundll32.exe 84 PID 2424 wrote to memory of 3096 2424 rundll32.exe 84 PID 2424 wrote to memory of 3096 2424 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acc12885d0b2975a338175189dd507e7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acc12885d0b2975a338175189dd507e7_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3096
-