Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 04:35
Static task
static1
Behavioral task
behavioral1
Sample
ea98564a7a860ece86eaf0c7da455c39_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea98564a7a860ece86eaf0c7da455c39_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ea98564a7a860ece86eaf0c7da455c39_JaffaCakes118.dll
-
Size
231KB
-
MD5
ea98564a7a860ece86eaf0c7da455c39
-
SHA1
f6bf5a7e37b946638787578f267d9d6f972bb148
-
SHA256
df5b80bef37de9678ddfc9c98bff2556b6f5d4580000e7a7521d762f0c163d8c
-
SHA512
008c6934e9514a0f8a2377b6c1d5576f5a607d1d16c6077887c45ca75fd5ae7cdcadd706b9982106709d3eb01129f2fff1b0d12e09ae057d4d2b45adb49f18cc
-
SSDEEP
3072:I7pXCIQ2L5fKv7Yr++FCa2qjrkGyJpqEc+B8a8ag1y5C7R+HuiezUE:I7pX/QG5iv7YrCan5yJQEZ8aR2QHuim
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4032 wrote to memory of 4440 4032 rundll32.exe 82 PID 4032 wrote to memory of 4440 4032 rundll32.exe 82 PID 4032 wrote to memory of 4440 4032 rundll32.exe 82 PID 4440 wrote to memory of 2288 4440 rundll32.exe 83 PID 4440 wrote to memory of 2288 4440 rundll32.exe 83 PID 4440 wrote to memory of 2288 4440 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea98564a7a860ece86eaf0c7da455c39_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea98564a7a860ece86eaf0c7da455c39_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2288
-
-