Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 09:07
Static task
static1
Behavioral task
behavioral1
Sample
b712a6a7c2ab07168b333bf92eb26ecc_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b712a6a7c2ab07168b333bf92eb26ecc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b712a6a7c2ab07168b333bf92eb26ecc_JaffaCakes118.dll
-
Size
84KB
-
MD5
b712a6a7c2ab07168b333bf92eb26ecc
-
SHA1
17d9a9682f3ea224cc9e9637a0cb4e0b99465d33
-
SHA256
d24fd24e3b0ec098e584b5830cba80f135acc3cffa06b325aee6f924b1890d22
-
SHA512
c96dab62fefec731c502b8689a7bb27f89c4a76069374abb310f2f9f62e4a017071b72435787136a28a38929771e80230bc3fedf25ee121cc5514c15b83e87fc
-
SSDEEP
768:GCoDc3sR03l+sj/v3RCz49dYYDekvgpaNTyyVXhKXX7nxqIVsW7GyEhGicPNrPKN:GC93MG/v99WYewgpaZyy7GX7cADGG/K
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1476 wrote to memory of 3760 1476 rundll32.exe 84 PID 1476 wrote to memory of 3760 1476 rundll32.exe 84 PID 1476 wrote to memory of 3760 1476 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b712a6a7c2ab07168b333bf92eb26ecc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b712a6a7c2ab07168b333bf92eb26ecc_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3760
-