Analysis
-
max time kernel
94s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 19:28
Static task
static1
Behavioral task
behavioral1
Sample
e9d31e678f3b7427a3d2fe92f4a93cc3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e9d31e678f3b7427a3d2fe92f4a93cc3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e9d31e678f3b7427a3d2fe92f4a93cc3_JaffaCakes118.dll
-
Size
201KB
-
MD5
e9d31e678f3b7427a3d2fe92f4a93cc3
-
SHA1
007f496ec91fb49d44c501393d3102e90f52ecd7
-
SHA256
cfd43b70e8c5273247538b4dd3ec15f148cc0d6f9d658022e93bd8ae9845c68c
-
SHA512
f9a0ed3a0e7834ae9fc218af9366948a9772d07e39014582a02e2021263c59262ef82460c6109e9e36fc5abb4302fb3cd3680bfc5c42ee4f2a22737637de6836
-
SSDEEP
3072:6zdHS/h44HWy7pAn96VOPR/DHOjqciTn97VHmgGN7saG40jbtxZj:rQopAIqDOjqciB7VGwzN
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4012 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2096 wrote to memory of 4012 2096 rundll32.exe 82 PID 2096 wrote to memory of 4012 2096 rundll32.exe 82 PID 2096 wrote to memory of 4012 2096 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e9d31e678f3b7427a3d2fe92f4a93cc3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e9d31e678f3b7427a3d2fe92f4a93cc3_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4012
-