Analysis
-
max time kernel
93s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 01:17
Static task
static1
Behavioral task
behavioral1
Sample
ea52eaf8cfa9d0bf05966e4372885c9d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea52eaf8cfa9d0bf05966e4372885c9d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ea52eaf8cfa9d0bf05966e4372885c9d_JaffaCakes118.dll
-
Size
71KB
-
MD5
ea52eaf8cfa9d0bf05966e4372885c9d
-
SHA1
e90811ed1d1c0416e5de95b37e5390148321cc2e
-
SHA256
f83d3b41e2767b9311b0ca06b37f6e653652dfbc3ed7da9a2abbdd2b338e7c0e
-
SHA512
a3ff8fb344b8fb0016fda9bfdc9f54e145967956f58fd4ffc338033816d3c9cbedf1b0b2e6cf7d657202b77d603581bf136926f651a4e066e36477f8c645b9b4
-
SSDEEP
768:qV5I1wcMQuZDYcKZjUIOKquvFWKRV7X8PHYgYAm4G64SgeTCMKvMdwDYnRtOXxdN:qV5swcMQwaj/jBKexjLwbKVSEYQffyo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5020 wrote to memory of 812 5020 rundll32.exe 82 PID 5020 wrote to memory of 812 5020 rundll32.exe 82 PID 5020 wrote to memory of 812 5020 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea52eaf8cfa9d0bf05966e4372885c9d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea52eaf8cfa9d0bf05966e4372885c9d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:812
-