Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
dbd5c33c0c3e26fcef4da20e4a165a81_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbd5c33c0c3e26fcef4da20e4a165a81_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dbd5c33c0c3e26fcef4da20e4a165a81_JaffaCakes118.dll
-
Size
29KB
-
MD5
dbd5c33c0c3e26fcef4da20e4a165a81
-
SHA1
4849bfee61b69b874050a5896fffdc79d6da2119
-
SHA256
4e666a142509c45b3b7b54ba90add876f5a20965a7830e67fca142403a6fd6b6
-
SHA512
2818cbc360d5f548ccd60cef2364a67a852cc0763b43d444079016447f332c8265a98b9ecc50c7b9fcdc4175629a46c5518def8490a6d49bbb725f7530b7f8a5
-
SSDEEP
192:6M+ww1b4KcJYGWtmkWpWh8SxC+ebCf3EkQpkqs1IPMyowJL/hpy:Wb4X3WtmhpWTx0bCf1qMYJL6
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1740 wrote to memory of 940 1740 rundll32.exe 83 PID 1740 wrote to memory of 940 1740 rundll32.exe 83 PID 1740 wrote to memory of 940 1740 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbd5c33c0c3e26fcef4da20e4a165a81_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbd5c33c0c3e26fcef4da20e4a165a81_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:940
-