Analysis
-
max time kernel
95s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 00:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d0b7099b760b91799b2f4054b808adf6_JaffaCakes118.dll
Resource
win7-20240729-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
d0b7099b760b91799b2f4054b808adf6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
d0b7099b760b91799b2f4054b808adf6_JaffaCakes118.dll
-
Size
3KB
-
MD5
d0b7099b760b91799b2f4054b808adf6
-
SHA1
e99515d6ce31bfc101050a92c68c98a5f3ea9d6a
-
SHA256
6228104e5a4dd494a507078ce0c85cb51770d4dd9958d12288934b0c72576dcd
-
SHA512
0f2ded2eed7a43b143d8cea81b9f4778d5ad9c300f87e041e1170b5f96c5b218693d958f0bacef62932aafbe30ae7f84cc6c872b83c76b747d0cbff752892c46
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4736 wrote to memory of 928 4736 rundll32.exe 83 PID 4736 wrote to memory of 928 4736 rundll32.exe 83 PID 4736 wrote to memory of 928 4736 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0b7099b760b91799b2f4054b808adf6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0b7099b760b91799b2f4054b808adf6_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:928
-