Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 19:18
Static task
static1
Behavioral task
behavioral1
Sample
bf3ca4fe7d147240b2bdf0a1df6a42bd_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bf3ca4fe7d147240b2bdf0a1df6a42bd_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bf3ca4fe7d147240b2bdf0a1df6a42bd_JaffaCakes118.dll
-
Size
12KB
-
MD5
bf3ca4fe7d147240b2bdf0a1df6a42bd
-
SHA1
920b488bee6f9b79750f2eae09126deab1451ade
-
SHA256
40f34338740f2d19bf01ca7fd348f4ce208667c5a6d59e7e13d79a65b8678250
-
SHA512
a4122ae0c3210905e84bf5f95dac107e8c7e07f811f4e1b84b4d038a803afadbadf6ecaa6ae403bca9c252a9598f7d53a10bfb40c1265a81d7cb83df4c7cb281
-
SSDEEP
384:m3W/WnchRXGOuAOO5B2qIdSaKGMjWgJplaH:5r5BESuMSg3laH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4900 wrote to memory of 4936 4900 rundll32.exe 84 PID 4900 wrote to memory of 4936 4900 rundll32.exe 84 PID 4900 wrote to memory of 4936 4900 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bf3ca4fe7d147240b2bdf0a1df6a42bd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bf3ca4fe7d147240b2bdf0a1df6a42bd_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4936
-