Analysis
-
max time kernel
134s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 07:10
Static task
static1
Behavioral task
behavioral1
Sample
bac82f7e8bc8c34576684fd2eb9a24fc_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bac82f7e8bc8c34576684fd2eb9a24fc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bac82f7e8bc8c34576684fd2eb9a24fc_JaffaCakes118.dll
-
Size
124KB
-
MD5
bac82f7e8bc8c34576684fd2eb9a24fc
-
SHA1
6a5d862056c8ac75767ed811566eaed419ffc2e7
-
SHA256
1b50c7f53781fbe397133abc8e3f83d568715a5310980ffc6ca855e8bdfb2404
-
SHA512
a19520afd21eb07d0e515d34b5e9ea59a0261b59386baf8008bd9dc7149d4b84d63456ad44c111ad442ab406d15d41bc35e520ab93e6ec136419b28aa1b123d3
-
SSDEEP
1536:skNV6kj+Z3K69NweUEYCQt7BLd9mjnTeLZEuf8FGVEh6Tio9ZBR:skNEpLQt7BLXmm1EuEEV5jB
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3064 wrote to memory of 3920 3064 rundll32.exe 84 PID 3064 wrote to memory of 3920 3064 rundll32.exe 84 PID 3064 wrote to memory of 3920 3064 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bac82f7e8bc8c34576684fd2eb9a24fc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bac82f7e8bc8c34576684fd2eb9a24fc_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3920
-