Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 10:20
Static task
static1
Behavioral task
behavioral1
Sample
b742cec399b0b684404d48f7d676fc40_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b742cec399b0b684404d48f7d676fc40_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b742cec399b0b684404d48f7d676fc40_JaffaCakes118.dll
-
Size
60KB
-
MD5
b742cec399b0b684404d48f7d676fc40
-
SHA1
089561e151aae6a219067fddf5fd9f6a1871d541
-
SHA256
ae2cc6c7f897dcc373ecc95f236d12d86b05367cf790bbf4d93f644eed600269
-
SHA512
22f614ebe00577bf4853d3709e07b255128e4af98b193fa618007998c32fc9965c2a276a4008fbb8fc455c0d60206131ad7bbb2f4c70bd80677396e3268ec3f5
-
SSDEEP
1536:M70aWE4hpnDL2qVD1DzUmPQNYrfDSU+05w:Q/gpnPhVZsNYn5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 728 wrote to memory of 3892 728 rundll32.exe 84 PID 728 wrote to memory of 3892 728 rundll32.exe 84 PID 728 wrote to memory of 3892 728 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b742cec399b0b684404d48f7d676fc40_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b742cec399b0b684404d48f7d676fc40_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3892
-