Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
b29331b8284d5f423698bbef6502f8a6_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b29331b8284d5f423698bbef6502f8a6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b29331b8284d5f423698bbef6502f8a6_JaffaCakes118.dll
-
Size
44KB
-
MD5
b29331b8284d5f423698bbef6502f8a6
-
SHA1
3c77f1a1c194b3edf4cee3b2c750d7cdf04c0b38
-
SHA256
3049f7453ac26197400bf88019a5ec6264a759cbcb97490d98788ed9c642fce9
-
SHA512
bee085ef169046bef8a2e17c5c3a9e86c9144c5721ac518ba77eb1fc462eff0fc8f97abba2eaceb592755eead70526bea12b86473e1540f2a3fca353fb517c79
-
SSDEEP
768:ayEM7A6JAkEyLf1dOOpSeFa5JL9kOMtoMA:aA7AQA5CD0JiOeA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1392 wrote to memory of 2308 1392 rundll32.exe 83 PID 1392 wrote to memory of 2308 1392 rundll32.exe 83 PID 1392 wrote to memory of 2308 1392 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b29331b8284d5f423698bbef6502f8a6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b29331b8284d5f423698bbef6502f8a6_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2308
-