Analysis
-
max time kernel
138s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
ad08b58967ca96fac322629ab7802db7_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ad08b58967ca96fac322629ab7802db7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ad08b58967ca96fac322629ab7802db7_JaffaCakes118.dll
-
Size
34KB
-
MD5
ad08b58967ca96fac322629ab7802db7
-
SHA1
1383b417cbc3a8826e9a8470a2e98786bb203a47
-
SHA256
96b679ec64cf634cd48489dbcb61f925b6f919acc4076d15dfd8e5b8beed2cfd
-
SHA512
2d3b3c6984d6d769dd1990563a26da56e0740647ac18f6cfab7bf34f510f866c8dfcaa7d08eb1147652fe9d2d576186823d270cc82de50572895e3d6a96227c9
-
SSDEEP
768:WJOcSsphT92HPYXzNj75ZMfC5Chw09FRst5:WJOHeT8Hm75ZM6U6yFRc5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3180 wrote to memory of 3592 3180 rundll32.exe 84 PID 3180 wrote to memory of 3592 3180 rundll32.exe 84 PID 3180 wrote to memory of 3592 3180 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad08b58967ca96fac322629ab7802db7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad08b58967ca96fac322629ab7802db7_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3592
-