Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
acd8da8fc770d16854fe58bd2297da80_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
acd8da8fc770d16854fe58bd2297da80_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
acd8da8fc770d16854fe58bd2297da80_JaffaCakes118.dll
-
Size
120KB
-
MD5
acd8da8fc770d16854fe58bd2297da80
-
SHA1
89c3592f5bf9e00dc1be0cca552a8d691295d1f0
-
SHA256
0f877017b93b6cd7f87c0656260680388d5b1e86c9a887b506cd9889c4fbe9db
-
SHA512
6768cc0352a89685e9f72331df4b6974daa8146a15216de61cfcb3d8d2881ca90012529522350b3ee525d2d922d83bd4652812b8b098ed9dd71868e07d98497f
-
SSDEEP
3072:5WC5SAmaQ7CC6ddFLo2h5t7OJhDo2QbY:3SAy7CXhoi5t7OfDo2x
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2552 wrote to memory of 5016 2552 rundll32.exe 84 PID 2552 wrote to memory of 5016 2552 rundll32.exe 84 PID 2552 wrote to memory of 5016 2552 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acd8da8fc770d16854fe58bd2297da80_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\acd8da8fc770d16854fe58bd2297da80_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5016
-