Analysis
-
max time kernel
131s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 09:56
Static task
static1
Behavioral task
behavioral1
Sample
aec74b449e5b498a7084c598d7415009_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aec74b449e5b498a7084c598d7415009_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
aec74b449e5b498a7084c598d7415009_JaffaCakes118.dll
-
Size
19KB
-
MD5
aec74b449e5b498a7084c598d7415009
-
SHA1
621ab8874eb6b5c50ebd1f265e77b11b751dd713
-
SHA256
7271f93c9fb5f885fd8b0b68b65bee9e5ff2daa119f4d1269e206fcd910f3557
-
SHA512
ae3c7e1f7022c145946b86e86fc2fc9647bf1ce44c8e360af09e12fc3115814e24362fa93c84901bb5ef8a0c8675fcb65d28f3521969518e7558f7f93cba0005
-
SSDEEP
192:qi/arttk2OOg9J1FLy7xC40JNefO314qKCtCS2teeG2qgynUMzkraunSOsB6+a7+:qDjpm9vJ+30JRt4teBpSraunHsBnad4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1840 wrote to memory of 224 1840 rundll32.exe 84 PID 1840 wrote to memory of 224 1840 rundll32.exe 84 PID 1840 wrote to memory of 224 1840 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aec74b449e5b498a7084c598d7415009_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aec74b449e5b498a7084c598d7415009_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:224
-