Analysis
-
max time kernel
91s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 02:52
Static task
static1
Behavioral task
behavioral1
Sample
e19101c44ffd3f8522eb3aac8c065057_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e19101c44ffd3f8522eb3aac8c065057_JaffaCakes118.dll
Resource
win10v2004-20240910-en
General
-
Target
e19101c44ffd3f8522eb3aac8c065057_JaffaCakes118.dll
-
Size
237KB
-
MD5
e19101c44ffd3f8522eb3aac8c065057
-
SHA1
b90d5f7df809136a5824f4aa643ddb75ac8e3a33
-
SHA256
5698b8f6ebdec9de261f6b7e37ae3ef84d03f1574749d23c29249647a298ddb1
-
SHA512
665f301b715022ab5f836f304107a432a106f7364088ae8d05cee8ca68d030f28ad807e2989cd0598ea036d16402af2b30db2a96cca4c262eab7924cf68f000d
-
SSDEEP
6144:UU93T78Ec1eNB79AZy990Fup2jkbplh39shceRIG2jo61:UUjc1eNB79A3FyekVWhceRIr/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 440 wrote to memory of 4544 440 rundll32.exe 83 PID 440 wrote to memory of 4544 440 rundll32.exe 83 PID 440 wrote to memory of 4544 440 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e19101c44ffd3f8522eb3aac8c065057_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e19101c44ffd3f8522eb3aac8c065057_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4544
-