Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 04:20
Static task
static1
Behavioral task
behavioral1
Sample
cea3bc465161cd24b77c542d98caf1c8_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
cea3bc465161cd24b77c542d98caf1c8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
cea3bc465161cd24b77c542d98caf1c8_JaffaCakes118.dll
-
Size
1.5MB
-
MD5
cea3bc465161cd24b77c542d98caf1c8
-
SHA1
6496e261e11d2616c46c6afde38207a142c3a5a0
-
SHA256
44d7101a3bdbbd1319fd8b50c9b4efd9c5859f5ca8a0b393f03d228fd028ed0c
-
SHA512
b2c47952093d708d86892784c60f28e52e7ccc9ccebea7ed2c71288500c05e7883ece8aa77362ae207112fafc952b1e4d2d42a1547edcda580daa7bc07bfdc0d
-
SSDEEP
24576:B+7oR3P78x7DmMc1l9Brm0dCWfR3YbtT9xYQrjzDff8pkzuVKU0NEd9YLcknK:BUKjmmnm0NZ3YbtZxYGrtE7YLcknK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 828 wrote to memory of 1316 828 rundll32.exe 83 PID 828 wrote to memory of 1316 828 rundll32.exe 83 PID 828 wrote to memory of 1316 828 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cea3bc465161cd24b77c542d98caf1c8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cea3bc465161cd24b77c542d98caf1c8_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1316
-