Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
e11dbf783355929b84e54f72900e8e20_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e11dbf783355929b84e54f72900e8e20_JaffaCakes118.dll
Resource
win10v2004-20240910-en
General
-
Target
e11dbf783355929b84e54f72900e8e20_JaffaCakes118.dll
-
Size
28KB
-
MD5
e11dbf783355929b84e54f72900e8e20
-
SHA1
c2882b7d0742c89e53c252b90276129f87b9e2c4
-
SHA256
c49d00855580151eeb94c2fa067a4c13c2680001090c74e99aa344a3718f0971
-
SHA512
9b9c6e5f45639e8b50fd2db75d40b87d4b75acf3029e95aff0f605527a9815fb42f726c1adefeb909718090c5b822d9d88d6e66b53c2a782e768e48aafb5227f
-
SSDEEP
768:xmNBRJX+H+8HPH8Ds8VsEYga5TBpP7ywCSQmpU:wOv2s8VTE92
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5116 wrote to memory of 2352 5116 rundll32.exe 83 PID 5116 wrote to memory of 2352 5116 rundll32.exe 83 PID 5116 wrote to memory of 2352 5116 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e11dbf783355929b84e54f72900e8e20_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e11dbf783355929b84e54f72900e8e20_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2352
-