Analysis
-
max time kernel
93s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 13:45
Static task
static1
Behavioral task
behavioral1
Sample
da79b4b7beba59d1902fb076d06d486d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da79b4b7beba59d1902fb076d06d486d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
da79b4b7beba59d1902fb076d06d486d_JaffaCakes118.dll
-
Size
184KB
-
MD5
da79b4b7beba59d1902fb076d06d486d
-
SHA1
ab427856421d0972f1cd3c22a2e86d0a51b904a1
-
SHA256
53235f0ad7157b4f726e439aa803e0d7f59bf1c417a24f9b614846233b8c3d7a
-
SHA512
4b0f99854fcb595308daabe8a47f660fdb8f455dd79254b21857be0cfe3012a53e27652e522bd1dacd031b2e5605bb7aaeb5987879de88df3ed668786e9b84de
-
SSDEEP
3072:SDKPGwGinVvRJRp2QfRwZWT4LDXXpfFxKgO4miDFZKQ83FjNvtlOd+9BI2:YKPGwjVvRJRp2gwZWT4RDDF8VjAd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1580 wrote to memory of 2348 1580 rundll32.exe 83 PID 1580 wrote to memory of 2348 1580 rundll32.exe 83 PID 1580 wrote to memory of 2348 1580 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da79b4b7beba59d1902fb076d06d486d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da79b4b7beba59d1902fb076d06d486d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2348
-