Analysis
-
max time kernel
110s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
d228d885219d5144f726ffd2cbcc00ac_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d228d885219d5144f726ffd2cbcc00ac_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d228d885219d5144f726ffd2cbcc00ac_JaffaCakes118.dll
-
Size
1.7MB
-
MD5
d228d885219d5144f726ffd2cbcc00ac
-
SHA1
b66428709f0dc28282577c0df1c342cb58d7612f
-
SHA256
deb9ae16a8e7cff375322e249ec317803b84739ef47e9e902c341b6f02062466
-
SHA512
3257b2c3a835fc97d8f359dd58cbe82211a1f5d9184569f4d6eb6daeacff6b6120f04234c93faf6ee5a2f8d5a4da2a6209b3333fdc03e04e5841431fc130b8df
-
SSDEEP
49152:MPJcqEThFjORhGtZsKz+S1fabceEr/aT9ZDNj:ocF9FOvGtZsW+S1faQxyJ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5764 wrote to memory of 2228 5764 rundll32.exe 85 PID 5764 wrote to memory of 2228 5764 rundll32.exe 85 PID 5764 wrote to memory of 2228 5764 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d228d885219d5144f726ffd2cbcc00ac_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d228d885219d5144f726ffd2cbcc00ac_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2228
-