Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 18:35
Static task
static1
Behavioral task
behavioral1
Sample
bcb995a5e3e7dbdef52134d72c4af3f9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bcb995a5e3e7dbdef52134d72c4af3f9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bcb995a5e3e7dbdef52134d72c4af3f9_JaffaCakes118.dll
-
Size
108KB
-
MD5
bcb995a5e3e7dbdef52134d72c4af3f9
-
SHA1
34d72c70367ad33d2b8d8299c5467d79d334656a
-
SHA256
ba1d856756968df2dd901b482d77d5a9ae8a36bda085895b9fdeb1bf6f5e0da0
-
SHA512
cb2418f8ed8113e71c0da4c537c46e3c7a758f977b88ba99bfb2e962e2f3924250487347c8b6f9264a13c0e3f36aac1cfeba038d20d5da304be685b287068ea2
-
SSDEEP
3072:2fn3ggZivHXVrikmP2dKObx+cixanpk70W:m3X6XVuOXb4hxGa7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4760 wrote to memory of 532 4760 rundll32.exe 84 PID 4760 wrote to memory of 532 4760 rundll32.exe 84 PID 4760 wrote to memory of 532 4760 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bcb995a5e3e7dbdef52134d72c4af3f9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bcb995a5e3e7dbdef52134d72c4af3f9_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:532
-