Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 16:31
Static task
static1
Behavioral task
behavioral1
Sample
d25d1c37cbe724eaf44f1f8b365e1d9a_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d25d1c37cbe724eaf44f1f8b365e1d9a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d25d1c37cbe724eaf44f1f8b365e1d9a_JaffaCakes118.dll
-
Size
10KB
-
MD5
d25d1c37cbe724eaf44f1f8b365e1d9a
-
SHA1
28f94b9c60595b2836d2928cf6fc7cdadd491ee4
-
SHA256
a1115a76df4630f201900414b0d8fe1720f3778c072d696ed0bacb801c36f0ec
-
SHA512
b4152c8a0ff5e0e629eb8164e5b088d39ab975e58de18423b3fc208fe6a92266133a57baad646ca95b3268791212fea4513114f0f23203df44223a410208934d
-
SSDEEP
192:npxDgtAHawJhayX9eyWLo8hII1q4i/jcWkhk8hZTW:EtiHX9GLxbq4iLz0Z6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1636 wrote to memory of 4992 1636 rundll32.exe 83 PID 1636 wrote to memory of 4992 1636 rundll32.exe 83 PID 1636 wrote to memory of 4992 1636 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d25d1c37cbe724eaf44f1f8b365e1d9a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d25d1c37cbe724eaf44f1f8b365e1d9a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4992
-