Analysis
-
max time kernel
138s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 16:11
Static task
static1
Behavioral task
behavioral1
Sample
afe98437d4e363674b8a955a886a9aa5_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afe98437d4e363674b8a955a886a9aa5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
afe98437d4e363674b8a955a886a9aa5_JaffaCakes118.dll
-
Size
28KB
-
MD5
afe98437d4e363674b8a955a886a9aa5
-
SHA1
ad20101b2f9d3560ddd547ed51ad8da106067e9c
-
SHA256
d9be65eb7b693de05f790c3d62b035a876bcdcf1af49660b5979fcbd16728212
-
SHA512
7d75d35c7fcf9d83fb24b47cf5c42de1561ba6cf307d38b301286c01502f7380beb15a6c29296fdff65720bc5e0d6105dd523b1965d0f240099742137d1a82cf
-
SSDEEP
384:jp261A/k96enznzgQNxADdpyLXQo5yea1+fnBjb:jp2EskgefgQbAyHycfnZb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1256 wrote to memory of 1468 1256 rundll32.exe 86 PID 1256 wrote to memory of 1468 1256 rundll32.exe 86 PID 1256 wrote to memory of 1468 1256 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\afe98437d4e363674b8a955a886a9aa5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\afe98437d4e363674b8a955a886a9aa5_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1468
-