Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 08:49
Static task
static1
Behavioral task
behavioral1
Sample
ae93959f80e1b3b38f9b889966eef98f_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ae93959f80e1b3b38f9b889966eef98f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ae93959f80e1b3b38f9b889966eef98f_JaffaCakes118.dll
-
Size
95KB
-
MD5
ae93959f80e1b3b38f9b889966eef98f
-
SHA1
995ef875bf6cee0f7b14ba38183168b52a1134e1
-
SHA256
3d6815cbf5fcb5fa3349c6cc87ea7e07c57d1d301afe2d66261edd5fd0b4da4d
-
SHA512
e375dfe5f03f154afc9c73fea9566cb8dc4934734bfb776236200807a67e9a91f995218ec1cca9226500a1ab3b3a731babb8bed75fd98270b63b7f7a0e495dff
-
SSDEEP
1536:H96agcrQ4LltYPNglqTSaef1/eKA+wydmpC88At8JwGryh35SjX1BWQTobN6:dH9rPLOxG1eKlfdmoLAGJwGWh35SrXZB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2996 rundll32.exe 2996 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2996 2336 rundll32.exe 30 PID 2336 wrote to memory of 2996 2336 rundll32.exe 30 PID 2336 wrote to memory of 2996 2336 rundll32.exe 30 PID 2336 wrote to memory of 2996 2336 rundll32.exe 30 PID 2336 wrote to memory of 2996 2336 rundll32.exe 30 PID 2336 wrote to memory of 2996 2336 rundll32.exe 30 PID 2336 wrote to memory of 2996 2336 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae93959f80e1b3b38f9b889966eef98f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae93959f80e1b3b38f9b889966eef98f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2996
-