Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 19:56
Behavioral task
behavioral1
Sample
b4d1b5cc62019c0bebead4598b30cea7_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4d1b5cc62019c0bebead4598b30cea7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b4d1b5cc62019c0bebead4598b30cea7_JaffaCakes118.dll
-
Size
2.8MB
-
MD5
b4d1b5cc62019c0bebead4598b30cea7
-
SHA1
09dd789b0c02c55ad962570c743753975ef662de
-
SHA256
04272ed827f0cbb09239312fa857bca5278f699870a953a261350ce685dcc5da
-
SHA512
4404de5d3db86d6a67116e96bbcc4f725619ac060709118e0db2153a0f5655167e306f603c208c3b47d2d88aa5821f45cd154ffc71c0e7ab39c31248805ff3c2
-
SSDEEP
49152:ZIABPkw//XvbfDYf97xs1fGSlqm6SkFXfurkJnRfNmpqnYm:zt//f3YF7xyfGIqjl3nVNmp4Ym
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3996 wrote to memory of 3724 3996 rundll32.exe 84 PID 3996 wrote to memory of 3724 3996 rundll32.exe 84 PID 3996 wrote to memory of 3724 3996 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4d1b5cc62019c0bebead4598b30cea7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4d1b5cc62019c0bebead4598b30cea7_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3724
-