Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 05:50
Static task
static1
Behavioral task
behavioral1
Sample
dbed51e4e77c963c77bc31463f1c06e8_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbed51e4e77c963c77bc31463f1c06e8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dbed51e4e77c963c77bc31463f1c06e8_JaffaCakes118.dll
-
Size
32KB
-
MD5
dbed51e4e77c963c77bc31463f1c06e8
-
SHA1
a83250f4f7301c60a92ef36fe4b68cea042ebb29
-
SHA256
789f777c23a313ee2f9c5506746825839bde787c7427bd11762cd1dbe1e4716c
-
SHA512
4c6b5bb8898f096357e83ee41da5efb9c764cc5b6b23ed01595977c56d3452785022791344f6efae42fe732e62a84cca9fd68a8f15e4aa1738ee0a83e380414c
-
SSDEEP
192:q2PE49SgzAwbrT/6EAOuRGxrQX4jjOnRKmZBdZDiTfcaRVIyU4ro+vcp8xZl9vSa:Np9lAwbrTisuR2fLmlggyUaCoIo9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4136 wrote to memory of 5060 4136 rundll32.exe 83 PID 4136 wrote to memory of 5060 4136 rundll32.exe 83 PID 4136 wrote to memory of 5060 4136 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbed51e4e77c963c77bc31463f1c06e8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dbed51e4e77c963c77bc31463f1c06e8_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5060
-