Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
d148d0c83a7e1ba51224a58ab7913e27_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d148d0c83a7e1ba51224a58ab7913e27_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d148d0c83a7e1ba51224a58ab7913e27_JaffaCakes118.dll
-
Size
78KB
-
MD5
d148d0c83a7e1ba51224a58ab7913e27
-
SHA1
1466488d9a9473bd3503360f4698469654aea26b
-
SHA256
b4884096d0e94566bb48d4a5ead3787116d97e0b198947a2c74040bd3a33747d
-
SHA512
011f44e9b91982a7028b232384943ba1b96be46271126e93adccb224b2e2b5e1c6c4f02be40a7b20fff25d4b0aa1f91c236031f64c1e8a29f6110adb6d857bcb
-
SSDEEP
1536:AOAPHq+G54oo/iY69SmFY6r4iypChCBbJl:AxTo9N976iNypICBbJl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4588 wrote to memory of 868 4588 rundll32.exe 83 PID 4588 wrote to memory of 868 4588 rundll32.exe 83 PID 4588 wrote to memory of 868 4588 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d148d0c83a7e1ba51224a58ab7913e27_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d148d0c83a7e1ba51224a58ab7913e27_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:868
-