Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 15:26
Static task
static1
Behavioral task
behavioral1
Sample
b828024f42f7ac875b06127901aba9a6_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b828024f42f7ac875b06127901aba9a6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b828024f42f7ac875b06127901aba9a6_JaffaCakes118.dll
-
Size
9KB
-
MD5
b828024f42f7ac875b06127901aba9a6
-
SHA1
6028cbfeddc70be681fe2fd0e0307feb7aa7cc9c
-
SHA256
7fcb6665748161a0d8f91438ea0aaf6987eb36b92fb82e1b6e35c991049a7667
-
SHA512
80a33f32fd9e47997da22b519483d9cc57f859459ab242d943e8bd19720701cb819e3ed43257fa1524bc6d84318e87995f4719404f5db7e2b11ba3d8cb4fb5a1
-
SSDEEP
96:q1V7dR7uwEU+hCT3GrxZ4MUtPNlz0MdG8EWvdM3IWwG34b:kuwEt8rsTUtPLzKNWSYWF4b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3904 wrote to memory of 3184 3904 rundll32.exe 84 PID 3904 wrote to memory of 3184 3904 rundll32.exe 84 PID 3904 wrote to memory of 3184 3904 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b828024f42f7ac875b06127901aba9a6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b828024f42f7ac875b06127901aba9a6_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3184
-