Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
df1bc6c17dc819f35f8ec1c303cd60b3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df1bc6c17dc819f35f8ec1c303cd60b3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
df1bc6c17dc819f35f8ec1c303cd60b3_JaffaCakes118.dll
-
Size
19KB
-
MD5
df1bc6c17dc819f35f8ec1c303cd60b3
-
SHA1
845daa0cb9e8997daafc035568fbaa36b4752207
-
SHA256
ba7603fa84be051323b51d5d58d08797d8c51599b0d5bed4fd6938173977a86b
-
SHA512
39435f6a0d21f423029e8e15163f8126e54c39400dc5c8f7f2d574abf656177c74206c3ae7f1ff2ab9e75a8968642dfdbf88058a9ed600c3ded0c5d776579162
-
SSDEEP
384:3dDtmzTj0jHKDlz13yKDlNbzXRCsNmCsDbCsisr:3yTjvb4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1856 1728 rundll32.exe 85 PID 1728 wrote to memory of 1856 1728 rundll32.exe 85 PID 1728 wrote to memory of 1856 1728 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df1bc6c17dc819f35f8ec1c303cd60b3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df1bc6c17dc819f35f8ec1c303cd60b3_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1856
-