Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 14:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d48dfca127dc847000eaa0fe5941a6c8_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
d48dfca127dc847000eaa0fe5941a6c8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
d48dfca127dc847000eaa0fe5941a6c8_JaffaCakes118.dll
-
Size
3KB
-
MD5
d48dfca127dc847000eaa0fe5941a6c8
-
SHA1
3e28f7a8510a3216e88b7c5ba7ed83e1be528209
-
SHA256
7d581ba949a5686325896a1781471dd36e266f8c9d122d67cc7cdb5970317167
-
SHA512
4730e97277629291917fd2ad01d45d805f3942e4f6106ef233aec08efa8a9d63621961c3fd89712199ce260d073e1943da788f8d6af3a4db7ec658564aa28a5f
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4756 wrote to memory of 716 4756 rundll32.exe 84 PID 4756 wrote to memory of 716 4756 rundll32.exe 84 PID 4756 wrote to memory of 716 4756 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d48dfca127dc847000eaa0fe5941a6c8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d48dfca127dc847000eaa0fe5941a6c8_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:716
-