Analysis
-
max time kernel
134s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
b730935752785a379312e7eb6d77f1d2_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b730935752785a379312e7eb6d77f1d2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b730935752785a379312e7eb6d77f1d2_JaffaCakes118.dll
-
Size
1.7MB
-
MD5
b730935752785a379312e7eb6d77f1d2
-
SHA1
256910933b4026a9b31a7e27afa62b6b0927bcb2
-
SHA256
20563a8ee5d43c7f49c6566bbf08af749d607fc0fc62a0757f0edb728a949c56
-
SHA512
dcd04c9427d10d18b3bf5dc3aa9302eb9f9e89baf7b55848301db8d065994b52cff841dd633b035bf29f2819b18dfda40d7431272ba55e6c584ad08110e3904c
-
SSDEEP
24576:h9cP7L4XpW5AzYj6R67hdt2SGI6A1t5DIw4csNDovTtw49jsjTdt1TU+/mafrWr:XUqR67hfnjPsZSqVTP/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4960 wrote to memory of 3368 4960 rundll32.exe 84 PID 4960 wrote to memory of 3368 4960 rundll32.exe 84 PID 4960 wrote to memory of 3368 4960 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b730935752785a379312e7eb6d77f1d2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b730935752785a379312e7eb6d77f1d2_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3368
-