Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 22:32
Static task
static1
Behavioral task
behavioral1
Sample
ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ec50a0d1ba634421cc3301633343ed04_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/jsgdacail.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/jsgdacail.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/jsgdacail.dll
-
Size
29KB
-
MD5
c3755ba829fe0ac168fde4f1f37ff531
-
SHA1
e534376fcaf95c9284fb242f8b962a85783e2956
-
SHA256
50d2bcd4477dc52e7c5dd1d2ee59a78133cb4ae3dd367aadc22053de8137a977
-
SHA512
d55473705589e789d5f92f79cf1c7dcefb7db21976829fc036593ef5de1eaf02a0c002fc9457b65314bba33bd6a05d06e31341bb147472f2160136e189c0a30b
-
SSDEEP
768:FYH4sBQJDh7wN4Ce1UtpWOPO8P9MuV7ERTJdG4:FIBQJDKLPO8P9P7E5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3612 wrote to memory of 1932 3612 rundll32.exe 82 PID 3612 wrote to memory of 1932 3612 rundll32.exe 82 PID 3612 wrote to memory of 1932 3612 rundll32.exe 82 PID 1932 wrote to memory of 4568 1932 rundll32.exe 83 PID 1932 wrote to memory of 4568 1932 rundll32.exe 83 PID 1932 wrote to memory of 4568 1932 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jsgdacail.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jsgdacail.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jsgdacail.dll,#13⤵PID:4568
-
-