Analysis
-
max time kernel
95s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:16
Static task
static1
Behavioral task
behavioral1
Sample
eabe5a56a8dec760cfddb1b01066d556_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
eabe5a56a8dec760cfddb1b01066d556_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eabe5a56a8dec760cfddb1b01066d556_JaffaCakes118.dll
-
Size
72KB
-
MD5
eabe5a56a8dec760cfddb1b01066d556
-
SHA1
8884f9ff18d6ebab5de6c2f3b58d91f222f48d47
-
SHA256
49c8a03f5e46aa5ffffaa31f7a579bab2f078044d9855a99c0ab1e90896a50a3
-
SHA512
a810286c89cd13d39aed0ddcb99ce4e1a8c4708d07ee2088e88fcd489585b15e5bade3398a419731d9d577dbc2e651cbd54d90adfb2e6bd43c5a92ce6ba69ecf
-
SSDEEP
1536:abPMkdoYx6TWLJXhKkO0cZzVoVTldQME:abPM0Hf1oZzVopTQM
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3480 wrote to memory of 3500 3480 rundll32.exe 82 PID 3480 wrote to memory of 3500 3480 rundll32.exe 82 PID 3480 wrote to memory of 3500 3480 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eabe5a56a8dec760cfddb1b01066d556_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eabe5a56a8dec760cfddb1b01066d556_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3500
-