Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 17:18
Static task
static1
Behavioral task
behavioral1
Sample
dcb0f6ff8abffbec2cdbacea72d23956_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcb0f6ff8abffbec2cdbacea72d23956_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dcb0f6ff8abffbec2cdbacea72d23956_JaffaCakes118.dll
-
Size
25KB
-
MD5
dcb0f6ff8abffbec2cdbacea72d23956
-
SHA1
1daba38e92e311f24cd78daeee97ec809b86c616
-
SHA256
b7be29fe77da80d7e69e898e470be74cf3d7af8c210c06839f2edf69ba49d0ba
-
SHA512
50352452db18dae262d7077e23b4300a3d02b4b690e69c983ebea2d2afeba6e00b00630a93a15c594175768f16367d15d4754b0f175b58f008a2b6a935cf8897
-
SSDEEP
384:P46Q4iW4NuaztttavknvDClfd177bI9CnqD2Y6awzfaRrx5:Pa4ZazttXvDCf17g9CqD56hzyRrx5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4520 wrote to memory of 636 4520 rundll32.exe 83 PID 4520 wrote to memory of 636 4520 rundll32.exe 83 PID 4520 wrote to memory of 636 4520 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dcb0f6ff8abffbec2cdbacea72d23956_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dcb0f6ff8abffbec2cdbacea72d23956_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:636
-