Analysis
-
max time kernel
93s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
d0f3dbd48a4b8a5f298a8c06468c3a68_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0f3dbd48a4b8a5f298a8c06468c3a68_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d0f3dbd48a4b8a5f298a8c06468c3a68_JaffaCakes118.dll
-
Size
7KB
-
MD5
d0f3dbd48a4b8a5f298a8c06468c3a68
-
SHA1
d7ef05e534db8f99ff75544fa332cf174524901a
-
SHA256
4e6fdc94a640d70c634351da5b8011a9b504eb7b3623303cb213d39af792eb30
-
SHA512
54efc94a808d111123f2cfbe197a0d634d419ad9cde4120fd459e2a818433fe9eeaa03484849cecd71b2d16967a1d41b61064e4d98da632485309eb8f65f6c36
-
SSDEEP
96:wb4VHccYJUC/aFbz/j0OvaPy9d3cX5aXW:wUaJf/aFbP0OL2JaX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1208 wrote to memory of 540 1208 rundll32.exe 82 PID 1208 wrote to memory of 540 1208 rundll32.exe 82 PID 1208 wrote to memory of 540 1208 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0f3dbd48a4b8a5f298a8c06468c3a68_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d0f3dbd48a4b8a5f298a8c06468c3a68_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:540
-