Analysis
-
max time kernel
93s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 00:45
Static task
static1
Behavioral task
behavioral1
Sample
ce451b5b456ae0e51ef33732a593c10b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ce451b5b456ae0e51ef33732a593c10b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ce451b5b456ae0e51ef33732a593c10b_JaffaCakes118.dll
-
Size
34KB
-
MD5
ce451b5b456ae0e51ef33732a593c10b
-
SHA1
6e46b08f2f0e5192b86c5ab39be57a348090e3a3
-
SHA256
1a124b2cc94ff4ff9297de467ce7d98934ccd3bab93bafa0b40b7baa92632ef5
-
SHA512
91151cc83f3d22fd8ca61ce0009d790eb56dba84c0e9072614708521c3ba4cb747e5ee1dde3cc15a1e529d42c891c907c33d3f4ac4234321c3f41a6c4ce69d01
-
SSDEEP
768:GalxmyDETt3qBTZkDsT7LlM7F7K1NSOD5Rca1Z:DjvDETt32KDsTHi7F7KmeRFZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5000 wrote to memory of 3488 5000 rundll32.exe 83 PID 5000 wrote to memory of 3488 5000 rundll32.exe 83 PID 5000 wrote to memory of 3488 5000 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce451b5b456ae0e51ef33732a593c10b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ce451b5b456ae0e51ef33732a593c10b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3488
-