Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 10:13
Static task
static1
Behavioral task
behavioral1
Sample
dffb56d39e647776b370135d73854892_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dffb56d39e647776b370135d73854892_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dffb56d39e647776b370135d73854892_JaffaCakes118.dll
-
Size
111KB
-
MD5
dffb56d39e647776b370135d73854892
-
SHA1
273af15a8111bd0013a9c2a3809424d249c97b2e
-
SHA256
68e6982da4dc0641e8310e28e7051c438797659c7a9b9f4d858b6dbf617d0cab
-
SHA512
e95df69e44cb259e99731a0a9b42eb2c23ec91a3109c960cbc07d3735e8c691ce7092b8f7495a503571b2fad8d3d984e02ca5a1fe9ed7e9a9574f8d77432ee0d
-
SSDEEP
1536:7W5YWF9knbfQooZ+wCOb4uek0FIfuVzkcj1DnTN28K:7sxkhoZHCb1wuNdj1DnTZK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4172 wrote to memory of 4460 4172 rundll32.exe 83 PID 4172 wrote to memory of 4460 4172 rundll32.exe 83 PID 4172 wrote to memory of 4460 4172 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dffb56d39e647776b370135d73854892_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dffb56d39e647776b370135d73854892_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4460
-