Analysis
-
max time kernel
95s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 14:02
Behavioral task
behavioral1
Sample
d21a3846a2493e0c3c7c7d8379a977e5_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d21a3846a2493e0c3c7c7d8379a977e5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d21a3846a2493e0c3c7c7d8379a977e5_JaffaCakes118.dll
-
Size
508KB
-
MD5
d21a3846a2493e0c3c7c7d8379a977e5
-
SHA1
fe1b7849a0795fc2b7c08077092bbf70f1c6d646
-
SHA256
c1413dd63296199f75701a1081657d6f86746a5d12861267166f989e6ca350b2
-
SHA512
4b72f002847779f1015826905cff0cea7b415074b4a5c89511bab8584b463726e2d57deea364e269f0c4c8ecf25022732b8b7a0f4747e7afb080bfcfd74397d2
-
SSDEEP
12288:uE6+171hACtklgoV8oN2QjVz1c2obY7wNZEnX/3uaD:u9+V1hNtkleoNXVjocz/+aD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4068 wrote to memory of 4304 4068 rundll32.exe 83 PID 4068 wrote to memory of 4304 4068 rundll32.exe 83 PID 4068 wrote to memory of 4304 4068 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d21a3846a2493e0c3c7c7d8379a977e5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d21a3846a2493e0c3c7c7d8379a977e5_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4304
-