Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 17:39
Static task
static1
Behavioral task
behavioral1
Sample
b465d085a5da180419c18489a943aa3a_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b465d085a5da180419c18489a943aa3a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b465d085a5da180419c18489a943aa3a_JaffaCakes118.dll
-
Size
36KB
-
MD5
b465d085a5da180419c18489a943aa3a
-
SHA1
dab29263321d444196bd7c943023aa78ca580296
-
SHA256
b5cf2e43120070d3c99539f114b06e361c60af72678461fd1898827d05beca35
-
SHA512
d7d566c41c1f6760643bd06cf3a0353b3e4c2f5b0c232c7a6970b7abf55d4fc52ac6d6230078c690bd00081f3bbfa5b5a11fac8ae49f3e6577e1e93c63937dc1
-
SSDEEP
384:AVqmm5MFlu0TTMFOimi/rCS+fztUmTQWOJW:mm5BV4KTGxP8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4908 wrote to memory of 4152 4908 rundll32.exe 84 PID 4908 wrote to memory of 4152 4908 rundll32.exe 84 PID 4908 wrote to memory of 4152 4908 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b465d085a5da180419c18489a943aa3a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b465d085a5da180419c18489a943aa3a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4152
-