Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 22:51
Static task
static1
Behavioral task
behavioral1
Sample
d53bb74c3a1f6b0a7e8ce5e7d779f5f0_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d53bb74c3a1f6b0a7e8ce5e7d779f5f0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d53bb74c3a1f6b0a7e8ce5e7d779f5f0_JaffaCakes118.dll
-
Size
21KB
-
MD5
d53bb74c3a1f6b0a7e8ce5e7d779f5f0
-
SHA1
3dca9a05a292a683e73bb957da1a6c28c7742473
-
SHA256
a61071b612ef1f0e24f495b0882cb54a7c4bad71dad0ba947bf07d0e738bb719
-
SHA512
a62cb3d4df8594d3bdf4a83afe58e5e91a7f9fcecfb75871a50a71678553f442c2a8343e1f3ac7f2148f108acd988a8d24db06a62bb5ad02193c557433a56a7b
-
SSDEEP
384:HbQPWzOEq+yiVtI89AP1DtxH4bfUwG65818yqHwOoJs55lpWBzVSc:HbDI8CBbH44w55818yqHwhq5gVS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4920 wrote to memory of 1508 4920 rundll32.exe 83 PID 4920 wrote to memory of 1508 4920 rundll32.exe 83 PID 4920 wrote to memory of 1508 4920 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d53bb74c3a1f6b0a7e8ce5e7d779f5f0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d53bb74c3a1f6b0a7e8ce5e7d779f5f0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1508
-