Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 07:18
Static task
static1
Behavioral task
behavioral1
Sample
d15ffbfca1a77d38eeaeb97c951776ce_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d15ffbfca1a77d38eeaeb97c951776ce_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d15ffbfca1a77d38eeaeb97c951776ce_JaffaCakes118.dll
-
Size
232KB
-
MD5
d15ffbfca1a77d38eeaeb97c951776ce
-
SHA1
169a281c6b9a29395bb2369cef68855b71309846
-
SHA256
1b087834697fd3a57747bce5abe97b16e5a472daa4ae8ac2c1585362810502f6
-
SHA512
fcc7b5bfbd746b35160474fc823f40178a2d301a6fcf8827a6ac7d91370d7fdd3d3503d6093807a2539298126b7964047268cb6facaf53b8cacc46e3b462f5be
-
SSDEEP
6144:Pz4FMKTen54VDh5qMzy6QDKRyBwGNids1GgRA:kFMsdpT1GoG7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2148 wrote to memory of 1400 2148 rundll32.exe 85 PID 2148 wrote to memory of 1400 2148 rundll32.exe 85 PID 2148 wrote to memory of 1400 2148 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d15ffbfca1a77d38eeaeb97c951776ce_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d15ffbfca1a77d38eeaeb97c951776ce_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1400
-