Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 12:42
Static task
static1
Behavioral task
behavioral1
Sample
d1f5b025c844d0aed77d17f34fc38a58_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1f5b025c844d0aed77d17f34fc38a58_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d1f5b025c844d0aed77d17f34fc38a58_JaffaCakes118.dll
-
Size
64KB
-
MD5
d1f5b025c844d0aed77d17f34fc38a58
-
SHA1
28672ce0592f4d7b4842b75c884c08c65458e59d
-
SHA256
811928007696c14efed882a9ef5ace1c093c630ed469906f606cd4bc07ff9f7f
-
SHA512
eb1df3a26d14f7bffd8ec372685805796e05a0349be6533a98af046c11ca00888ba89124d6d4d7cf9a2ec58ec9490062336a6226134fee34e1d730b603c3bb5c
-
SSDEEP
768:cHLEjXqOcy48wA+LkoqW8lyTxkw9U2p26wbzC5sdxMjiB9UQgwWHiGOs3qa:cWaC+Ltq1lyTCM8nzN4los6a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2572 wrote to memory of 2304 2572 rundll32.exe 83 PID 2572 wrote to memory of 2304 2572 rundll32.exe 83 PID 2572 wrote to memory of 2304 2572 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d1f5b025c844d0aed77d17f34fc38a58_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d1f5b025c844d0aed77d17f34fc38a58_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2304
-