Analysis
-
max time kernel
94s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 14:48
Behavioral task
behavioral1
Sample
cfc9850fe0030c4fa80fcb53639e910c_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cfc9850fe0030c4fa80fcb53639e910c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
cfc9850fe0030c4fa80fcb53639e910c_JaffaCakes118.dll
-
Size
18KB
-
MD5
cfc9850fe0030c4fa80fcb53639e910c
-
SHA1
ca315db62a7404f4919eb4ac8d34911226140060
-
SHA256
cf69e552c0f0a485aff97eb15b4fd6bf64e723bda73952365f1729b4efdbe1e1
-
SHA512
c3718f2118791e78d6d26444e7a99f358005ff1f63eb5faf65a6a2f01dc0d9ceb7c9b320d75103eea925efec00c6ff0b81a48b5baf355a91436b344527bf319b
-
SSDEEP
384:VzGJTEu2qc0lpLsz0/Cs0OqSHyf0mfIJIcNKCv+zfg:VZu2qdlpLsz9jpSHyvIJIGvuf
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4696 set thread context of 2428 4696 rundll32.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3840 wrote to memory of 4696 3840 rundll32.exe 83 PID 3840 wrote to memory of 4696 3840 rundll32.exe 83 PID 3840 wrote to memory of 4696 3840 rundll32.exe 83 PID 4696 wrote to memory of 2428 4696 rundll32.exe 84 PID 4696 wrote to memory of 2428 4696 rundll32.exe 84 PID 4696 wrote to memory of 2428 4696 rundll32.exe 84 PID 4696 wrote to memory of 2428 4696 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cfc9850fe0030c4fa80fcb53639e910c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cfc9850fe0030c4fa80fcb53639e910c_JaffaCakes118.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe3⤵
- System Location Discovery: System Language Discovery
PID:2428
-
-