Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 09:19
Static task
static1
Behavioral task
behavioral1
Sample
d4065b65ce1f7aae82a99f2862324ddb_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4065b65ce1f7aae82a99f2862324ddb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d4065b65ce1f7aae82a99f2862324ddb_JaffaCakes118.dll
-
Size
19KB
-
MD5
d4065b65ce1f7aae82a99f2862324ddb
-
SHA1
5bc1e5ac1da592255f20842217fbc5a6e10785bb
-
SHA256
2fd05984064866ac7c71d80cba10c82f6e4b2518c07dcab7aa388bfd12665eb1
-
SHA512
553b81585298bb930f33ebf72ec77fbce842592ab6c7d9c0822bc123a19f6a48fa2e8bb501d5d4b39e3b2d545f3f5a83defbf6608473061f7370675efb04e55e
-
SSDEEP
384:qdMTPE0F81+qjvAimK0QQNMrd46ElSgwRKugAINi9Y/pEGBnWd4:wMTPE0Fr4AYQNKqAgwsugAx2Wd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2444 wrote to memory of 4676 2444 rundll32.exe 82 PID 2444 wrote to memory of 4676 2444 rundll32.exe 82 PID 2444 wrote to memory of 4676 2444 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d4065b65ce1f7aae82a99f2862324ddb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d4065b65ce1f7aae82a99f2862324ddb_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4676
-