Analysis
-
max time kernel
133s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 21:40
Static task
static1
Behavioral task
behavioral1
Sample
bd41f15d6ff517c09a277a2c627d9d1c_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bd41f15d6ff517c09a277a2c627d9d1c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bd41f15d6ff517c09a277a2c627d9d1c_JaffaCakes118.dll
-
Size
144KB
-
MD5
bd41f15d6ff517c09a277a2c627d9d1c
-
SHA1
28f18f285cd513489b3e940f6bb420c1eb8d2325
-
SHA256
910b1dfe9b8e7a7d1e90e10881d29f163957e769fb819b964dff313a387cf0fd
-
SHA512
154c06cdc7e3f6cf9132d17c7c7e98e0584f2ed91c6c8a27630f7819309863a67cee0ac2e33441e727fe28669102ddbe19866e588828b4d4cb01ff0c9cdf6c1c
-
SSDEEP
3072:BGrf/e23eWa21+UumpnuH8bE2U7vVih4SVHkfk57S7UuEgacddL4O:Qr93SS9umpuH8XU7N9aHkfk57SAuEgFv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1304 wrote to memory of 3680 1304 rundll32.exe 84 PID 1304 wrote to memory of 3680 1304 rundll32.exe 84 PID 1304 wrote to memory of 3680 1304 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd41f15d6ff517c09a277a2c627d9d1c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd41f15d6ff517c09a277a2c627d9d1c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3680
-