Analysis
-
max time kernel
92s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 03:15
Static task
static1
Behavioral task
behavioral1
Sample
e1992c1ed9b24da68f22c832cb2ca42c_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e1992c1ed9b24da68f22c832cb2ca42c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e1992c1ed9b24da68f22c832cb2ca42c_JaffaCakes118.dll
-
Size
20KB
-
MD5
e1992c1ed9b24da68f22c832cb2ca42c
-
SHA1
b1515142a4271209f1ee84de1c61e220a9a32dcb
-
SHA256
30ef78efb4a03bf54391f4936b5cde5b78c37422369bd6a80835ab5accde289d
-
SHA512
b3237a0335a7bd05eedb837490626e5ab2cb555bb7b34ba99f9350801e579d194f095034a0e7991dbe7e8faaa2f3c9a315aa5308c398792386369c971ef1d652
-
SSDEEP
384:cdn7BN95D+43jGDP7izh1zJbxFOvozvLRTI8:mD90ujI7iV3gojNH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4700 wrote to memory of 2052 4700 rundll32.exe 83 PID 4700 wrote to memory of 2052 4700 rundll32.exe 83 PID 4700 wrote to memory of 2052 4700 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1992c1ed9b24da68f22c832cb2ca42c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e1992c1ed9b24da68f22c832cb2ca42c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2052
-