Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:29
Behavioral task
behavioral1
Sample
eac2bd9366470ccff34f0b0a960c6dcc_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eac2bd9366470ccff34f0b0a960c6dcc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eac2bd9366470ccff34f0b0a960c6dcc_JaffaCakes118.dll
-
Size
141KB
-
MD5
eac2bd9366470ccff34f0b0a960c6dcc
-
SHA1
1be8e15e77f0376d550a0c0926552a66105c999b
-
SHA256
ad635b65d60535a6f4deedb856603af0b92fb71bfe695dc2f84948fbbafdffc6
-
SHA512
45c8ea47f93fb1b17ba3eb49ab54521af1b5c8881d0d02bb75e5174ce70f904c17d7670fb48673ce2deb72957c61174e8369b89d29fa511809552fbffadbf1f9
-
SSDEEP
3072:pU714G5SqiIpR9HUVLYWRf/OYKehOPtoa:pC1JkRyWLYWdaehOF1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2296 2428 rundll32.exe 82 PID 2428 wrote to memory of 2296 2428 rundll32.exe 82 PID 2428 wrote to memory of 2296 2428 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eac2bd9366470ccff34f0b0a960c6dcc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eac2bd9366470ccff34f0b0a960c6dcc_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2296
-