Analysis
-
max time kernel
90s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
eaa4934ecc1a7fff841cb0cd7d62c7d7_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa4934ecc1a7fff841cb0cd7d62c7d7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eaa4934ecc1a7fff841cb0cd7d62c7d7_JaffaCakes118.dll
-
Size
70KB
-
MD5
eaa4934ecc1a7fff841cb0cd7d62c7d7
-
SHA1
bd56419872689974e2b236a7c479f5ac658d7026
-
SHA256
bf206b843dd287dded17379f3cd72a4c0787608dd0871d6461616ac9397d528c
-
SHA512
c477140a78cce5c989a37edb51d56efb67687b04f4a5f6b618913039adce49fda0057f4a82ee9a5c37055694e7219d5c6793df53927e817b0a1d2217e5d38888
-
SSDEEP
1536:H/+lis8usYy0G9LU16Q0+OVKoWka0qUqi5zzYMftcjuW+BwuSRl:Glis85YlMQpOV7x5z+n+BZSRl
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3540 wrote to memory of 4272 3540 rundll32.exe 85 PID 3540 wrote to memory of 4272 3540 rundll32.exe 85 PID 3540 wrote to memory of 4272 3540 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eaa4934ecc1a7fff841cb0cd7d62c7d7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eaa4934ecc1a7fff841cb0cd7d62c7d7_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4272
-