Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 22:30
Static task
static1
Behavioral task
behavioral1
Sample
bd6b21e30576af131aba8acc0cb566d3_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bd6b21e30576af131aba8acc0cb566d3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bd6b21e30576af131aba8acc0cb566d3_JaffaCakes118.dll
-
Size
64KB
-
MD5
bd6b21e30576af131aba8acc0cb566d3
-
SHA1
33cb1a8307d078c6f36a8b0160cc1e09fb6788e5
-
SHA256
f1c50b437308f36b67da510e65098be4573ce69f8fee19a07779157da1e9d80a
-
SHA512
2eac275245f1bfa1c6d959851bdfdb9b7a6340d6c729e74b726b5b0af6a63cd1a28d9c2a2e36ef89fcaed6d8838aa3d8d390264566edbe7d5166d921f8e9b997
-
SSDEEP
1536:KAWj/suBN+XX7/YJM6a5FSRoxx+qi3vAg/rXBOO:KbjkuB0XX7Aud5Fgoxsqi3vAYOO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1876 wrote to memory of 3380 1876 rundll32.exe 84 PID 1876 wrote to memory of 3380 1876 rundll32.exe 84 PID 1876 wrote to memory of 3380 1876 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd6b21e30576af131aba8acc0cb566d3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd6b21e30576af131aba8acc0cb566d3_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3380
-