Analysis
-
max time kernel
96s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 21:30
Static task
static1
Behavioral task
behavioral1
Sample
d71f61d1aa69178a67882fccce6f5e9e_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d71f61d1aa69178a67882fccce6f5e9e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d71f61d1aa69178a67882fccce6f5e9e_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
d71f61d1aa69178a67882fccce6f5e9e
-
SHA1
a05564cf23cbc73a60a9c51e5a6983050cb9dda5
-
SHA256
44131e018ab33e894adc3f1c6b947b76ee80ee16db3ce4c004562ca93e23e974
-
SHA512
c97cefbf1aee5674ba7d665e8a73d2bb54b00df8ba6c46174530bb3ebfa3f5936d31316237d38424c1b0a646ba09535d4a343c45e72220334523693ebd7ac850
-
SSDEEP
24576:xSKz9nAEEvNz8BzmU+YzIkT5JpwXBLbuIILpJOHrZbr277fXMs:0KzvEvNz8BzmU7/T5Jp2BnTkjOHlCf
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3028 wrote to memory of 1992 3028 rundll32.exe 83 PID 3028 wrote to memory of 1992 3028 rundll32.exe 83 PID 3028 wrote to memory of 1992 3028 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d71f61d1aa69178a67882fccce6f5e9e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d71f61d1aa69178a67882fccce6f5e9e_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1992
-