Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 09:02
Static task
static1
Behavioral task
behavioral1
Sample
b2dd5ed998cf7d47034b445cd241d712_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b2dd5ed998cf7d47034b445cd241d712_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b2dd5ed998cf7d47034b445cd241d712_JaffaCakes118.dll
-
Size
185KB
-
MD5
b2dd5ed998cf7d47034b445cd241d712
-
SHA1
a28f210e5cd9d17367ee7d9380779df9fe08b0bb
-
SHA256
86d061d60273ea6b0bfbe26d0b6b1e509b4c9f33c4e746dfaafcdc8b8dcb1013
-
SHA512
a3ad3667bd0a613fcfec64335b67605cb71ba2049310146e41a4a6774588058c720230d8560b3305b73a6bd5fbda5d2e3549be442ffc019b6115044d8ab527d3
-
SSDEEP
3072:fVVoAYs3KjVmiL3OzQbKp4H7Daf3URDL0KbzPlWLcWkTPuISS4d:dVo2oVmiDOUbvH7e3UdYKbz0IWkLuIhm
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3520 wrote to memory of 636 3520 rundll32.exe 84 PID 3520 wrote to memory of 636 3520 rundll32.exe 84 PID 3520 wrote to memory of 636 3520 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b2dd5ed998cf7d47034b445cd241d712_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b2dd5ed998cf7d47034b445cd241d712_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:636
-