Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
ea79788375ea2f550abf7864fef6b573_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea79788375ea2f550abf7864fef6b573_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ea79788375ea2f550abf7864fef6b573_JaffaCakes118.dll
-
Size
27KB
-
MD5
ea79788375ea2f550abf7864fef6b573
-
SHA1
56ba6a4ea7eb5b6e5ae1574423231d63230e21df
-
SHA256
6a36aafff421081a0125a90e60d41bb7f73a6624ee0137f07822a04d6bf1f23b
-
SHA512
da2f576e69d20870e658602f3b3da1eb0df8429328e803e6abaca8aa6a5510d25289891655ef75fbc8115941c5215bd1173057dbab768115ee703911d670e397
-
SSDEEP
768:AEur0gs8Dny/HxkAAYsXVGliZ5NTB/1KZu:urRFyxkAA5aEtKZu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3832 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4956 wrote to memory of 3832 4956 rundll32.exe 82 PID 4956 wrote to memory of 3832 4956 rundll32.exe 82 PID 4956 wrote to memory of 3832 4956 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea79788375ea2f550abf7864fef6b573_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea79788375ea2f550abf7864fef6b573_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3832
-