Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
d52a1550df6487d500dffb6673b5f1ad_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d52a1550df6487d500dffb6673b5f1ad_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d52a1550df6487d500dffb6673b5f1ad_JaffaCakes118.dll
-
Size
116KB
-
MD5
d52a1550df6487d500dffb6673b5f1ad
-
SHA1
28551d6fb5656c00887f39a14cf456e3e93624d5
-
SHA256
a6aeed41caa1cd3d3f1ba55e1bbf95babdaf0e5761c39cc4b702ff9795a770c3
-
SHA512
a01eebc887602e28de6f0b0aea5905104ef8e929e1998d410f9401ba473e264a83cb5ddae6506864a36ee5b3c5013fefe1be871b34db4dc11c2b4add1d124ac3
-
SSDEEP
1536:LSicwcHR78S4CN0MRKdIOheQeBZ53MVn1ktFvZImHTqEPHqAOTOIyIthlAdJPt:n5OG4zkyOhoBIHktF2vYHq7FthlAdD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2020 2288 rundll32.exe 83 PID 2288 wrote to memory of 2020 2288 rundll32.exe 83 PID 2288 wrote to memory of 2020 2288 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d52a1550df6487d500dffb6673b5f1ad_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d52a1550df6487d500dffb6673b5f1ad_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2020
-