Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 05:12
Static task
static1
Behavioral task
behavioral1
Sample
dbdfa4e485be3edd07c35dcf03c2a400_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbdfa4e485be3edd07c35dcf03c2a400_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dbdfa4e485be3edd07c35dcf03c2a400_JaffaCakes118.dll
-
Size
69KB
-
MD5
dbdfa4e485be3edd07c35dcf03c2a400
-
SHA1
7278159dd14d4fb336b0732416c1186683229721
-
SHA256
b1ae3050a2b48e1d0cc890939eff95f8ece603fcecd581aa0cda77ab9d642924
-
SHA512
ee04b878e705e735f8da07a258d4ef84504e0debbc36602180b38d6d9097bcf9751f4ef3414e0fe3ffa758a2f06618885ad0ceb50713207bc4bbfbfbe7b2f84c
-
SSDEEP
768:I4GuXCvvcL43ImMQEtGqhGwwi5hik24hLsOdh7KgpNtUCJIetWyKnDL/KlFbG6yi:7yvJ3IHXhGwlskvLsU8geoBcT+jyFzg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 712 wrote to memory of 2204 712 rundll32.exe 83 PID 712 wrote to memory of 2204 712 rundll32.exe 83 PID 712 wrote to memory of 2204 712 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbdfa4e485be3edd07c35dcf03c2a400_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbdfa4e485be3edd07c35dcf03c2a400_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2204
-