Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
c96f76d11426898af53af2448156ef15_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c96f76d11426898af53af2448156ef15_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c96f76d11426898af53af2448156ef15_JaffaCakes118.dll
-
Size
192KB
-
MD5
c96f76d11426898af53af2448156ef15
-
SHA1
2d59a0a00eaf2352a0f8ec4946e5a9da6329cc30
-
SHA256
21009cabf25bebd26e04c8218e3bdce559535e3e6179f9d326817f44e027cdf4
-
SHA512
7bd2a621968404c609700db637cb4c6e49436d7996a4082b88067c671ccf89faa15c0d61a643d85b280fd6f18d8ae8eaf42ae2553f8277b2874834321e449c46
-
SSDEEP
3072:gNbpOnPsGqQTruHLD7RcQxKrrdNU0VAtrOpOOWxOv4Kn7qbjx7T/HrmW:gNbqaLD7RcukVAtSQOWcgWqbV77LmW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1576 wrote to memory of 2120 1576 rundll32.exe 87 PID 1576 wrote to memory of 2120 1576 rundll32.exe 87 PID 1576 wrote to memory of 2120 1576 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c96f76d11426898af53af2448156ef15_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c96f76d11426898af53af2448156ef15_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2120
-