Analysis
-
max time kernel
95s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
d263177d5576b2f702ab7046ffe898c7_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d263177d5576b2f702ab7046ffe898c7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d263177d5576b2f702ab7046ffe898c7_JaffaCakes118.dll
-
Size
346KB
-
MD5
d263177d5576b2f702ab7046ffe898c7
-
SHA1
1d5930c608aab8f262f6ed15775d6979e15b1a7e
-
SHA256
9dacc651d21b64d997019c5d1ecff94379a8d86078036cdb38a8f29da9035446
-
SHA512
464ce10587cea02a220f2cd281b72d32b3711bea98b5a6c21d96d59275f07159aa3be00321bf6dc0e02c67cc8e88c85d4ac2d43b484224080a328ba7721519a8
-
SSDEEP
3072:i82jpiC2JG7HZb7XWQml/jz8A4diTE90Q6kF4CKAYRkcj:p2L7HN7Kl/jLA90QECrYRpj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5088 wrote to memory of 3612 5088 rundll32.exe 83 PID 5088 wrote to memory of 3612 5088 rundll32.exe 83 PID 5088 wrote to memory of 3612 5088 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d263177d5576b2f702ab7046ffe898c7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d263177d5576b2f702ab7046ffe898c7_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3612
-