Analysis
-
max time kernel
95s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
daddb70bdc878d57cab2e2c3f8dde82f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
daddb70bdc878d57cab2e2c3f8dde82f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
daddb70bdc878d57cab2e2c3f8dde82f_JaffaCakes118.dll
-
Size
165KB
-
MD5
daddb70bdc878d57cab2e2c3f8dde82f
-
SHA1
385907e0d38e859cb6d530574dd215202818fa47
-
SHA256
b45ecef5dc0c97048cd0c064d2fdc921012a36ed37e772d945c0b1ee7c86c622
-
SHA512
516440d93e8e67e6c0288c41f6d4e34b299f4a7e3215ea2a7e53e00abfc94d841bf6a94c017be97b2d515ac0ef85544866ec46038293dfe556e381180eb0eded
-
SSDEEP
3072:caNdeSbl4csXS+1oSOtDbdgsf0PSkm7WVolm4Qob4gCwV0ffRgDnldiNx:caNdbQXS+1QvWc0PSkm6Volm3DgDI0jG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4836 wrote to memory of 1224 4836 rundll32.exe 82 PID 4836 wrote to memory of 1224 4836 rundll32.exe 82 PID 4836 wrote to memory of 1224 4836 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\daddb70bdc878d57cab2e2c3f8dde82f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\daddb70bdc878d57cab2e2c3f8dde82f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1224
-