Analysis
-
max time kernel
132s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
bc3ffe2761d210fa05dde9ced4ed4869_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bc3ffe2761d210fa05dde9ced4ed4869_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bc3ffe2761d210fa05dde9ced4ed4869_JaffaCakes118.dll
-
Size
260KB
-
MD5
bc3ffe2761d210fa05dde9ced4ed4869
-
SHA1
342db0e9441152f6ac3f4babc3a4384a9d81f2c5
-
SHA256
0444af26647e6ca5ad5d0e1c48401a17ccbd162bf60dd37e5ace9e8be63a3ac1
-
SHA512
e413e787679bb447ee21e2a07ff71c7580615d8b1a8c79221f0d530092ff8bef7508ee4be3a6f1f100b2cbfc34a0837eafaea0bbb74325c88a2039ba3b1074fb
-
SSDEEP
6144:ttpPmafAo6FqVt7g6CscqXBL5HmpYZOJyu4GIZ1viB2T:ttp+86o1gIcuc1FnIZViBy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3716 wrote to memory of 1440 3716 rundll32.exe 85 PID 3716 wrote to memory of 1440 3716 rundll32.exe 85 PID 3716 wrote to memory of 1440 3716 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc3ffe2761d210fa05dde9ced4ed4869_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc3ffe2761d210fa05dde9ced4ed4869_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1440
-