Analysis
-
max time kernel
132s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 12:17
Static task
static1
Behavioral task
behavioral1
Sample
be92623e9f733cc128eb9f470a14a3bc_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
be92623e9f733cc128eb9f470a14a3bc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
be92623e9f733cc128eb9f470a14a3bc_JaffaCakes118.dll
-
Size
36KB
-
MD5
be92623e9f733cc128eb9f470a14a3bc
-
SHA1
a4c3b9393dd4d2e12284cbfa5ebb46d18a313789
-
SHA256
dca641393a7807f1f454567ecebdd45db3cb72b7cb7650223b5b4a35e6c89a06
-
SHA512
bb7a6444eae27a78a3ae931f700b636d5bbb8567920dabeaf5d625136c05b6fb343123b35e1baca0af9a5d82ecaf282f1ee2821bd348cf2f185f380fb323c988
-
SSDEEP
768:a5yiqZQafjAyKTCjMA6Lhbvh5YmbVMSPGhqvGNhku7y:/iqZQoXUCj/6GYVxehD3re
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4608 wrote to memory of 3448 4608 rundll32.exe 84 PID 4608 wrote to memory of 3448 4608 rundll32.exe 84 PID 4608 wrote to memory of 3448 4608 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be92623e9f733cc128eb9f470a14a3bc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\be92623e9f733cc128eb9f470a14a3bc_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3448
-