Analysis
-
max time kernel
90s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 04:24
Static task
static1
Behavioral task
behavioral1
Sample
cea5c9d30f6bef64f0dcdee22e247ab3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cea5c9d30f6bef64f0dcdee22e247ab3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
cea5c9d30f6bef64f0dcdee22e247ab3_JaffaCakes118.dll
-
Size
856KB
-
MD5
cea5c9d30f6bef64f0dcdee22e247ab3
-
SHA1
c753357137e38d1aa3ae757aae91a2f05268d2b5
-
SHA256
6163c4645c2538016949abe30f88fa0e979db806082c26e522c0e4824ba7fabc
-
SHA512
7784c2294f57d4c3e12e3a90dd8a05e9f29fb15512f2f3baeaf5549ef69acb0f8f3a75265d15d6857c4b78107adbe793e2f8ab97d0f30b24a75d963ba82237ee
-
SSDEEP
12288:s6InS9gcmnwH9Po/dl04E+yUu3QbStjM051pcO:sTnS9gcudQxUuAbStjd5EO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1852 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3400 wrote to memory of 1852 3400 rundll32.exe 83 PID 3400 wrote to memory of 1852 3400 rundll32.exe 83 PID 3400 wrote to memory of 1852 3400 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cea5c9d30f6bef64f0dcdee22e247ab3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cea5c9d30f6bef64f0dcdee22e247ab3_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1852
-