Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 00:55
Static task
static1
Behavioral task
behavioral1
Sample
dd5c77ad1503155019ee5c472ec8824c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd5c77ad1503155019ee5c472ec8824c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dd5c77ad1503155019ee5c472ec8824c_JaffaCakes118.dll
-
Size
11KB
-
MD5
dd5c77ad1503155019ee5c472ec8824c
-
SHA1
916ae72d3303c60878f30793a89bc99f28b50550
-
SHA256
9d61b44a1d2a92456d9974c97ca4ad37352ee31ef55577127cce2f9c0da9f9ea
-
SHA512
e89ee1aac1f019b28634464ee5034456143945eebb99a39205d927f7977976aaa0d081f989605e692d5068a7f11d08275d46604cfef39b81a98bab9055c0dfe7
-
SSDEEP
192:/QwW4ru+2qObsaesUP63ZK/HHuukbTPwwSwe4aUpMM2gyQiuQ8kgUw9k:/1W4P23bnesvJKP0vPBr7p0giDv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3168 wrote to memory of 5060 3168 rundll32.exe 83 PID 3168 wrote to memory of 5060 3168 rundll32.exe 83 PID 3168 wrote to memory of 5060 3168 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dd5c77ad1503155019ee5c472ec8824c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dd5c77ad1503155019ee5c472ec8824c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5060
-