Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 11:07
Static task
static1
Behavioral task
behavioral1
Sample
be76b4112292cb4191b944a7121067c9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
be76b4112292cb4191b944a7121067c9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
be76b4112292cb4191b944a7121067c9_JaffaCakes118.dll
-
Size
76KB
-
MD5
be76b4112292cb4191b944a7121067c9
-
SHA1
c0361bf8654dec7fcec3871ca488cf0808fa5a9b
-
SHA256
b4225aea482507e6eac74fdb37c10f93ee61e4e30a79bf333e08e1a19dd276d9
-
SHA512
2a714d4a7af021dd3921d564b6f3680129413906e818e9c2235e25055e11bb5e78006c334823d2b336a3ef7080cdb26e05881c511000a2d88a6d59ecfdb9f80b
-
SSDEEP
1536:s0m7IwTgP2Q0H1roTVIBwmTdWyWt5sQ7w:sFIYgObrutt5sQ7w
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 540 wrote to memory of 4544 540 rundll32.exe 84 PID 540 wrote to memory of 4544 540 rundll32.exe 84 PID 540 wrote to memory of 4544 540 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be76b4112292cb4191b944a7121067c9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be76b4112292cb4191b944a7121067c9_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4544
-