Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
eab5d6ca956b75320daaf3aecc2c8468_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab5d6ca956b75320daaf3aecc2c8468_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eab5d6ca956b75320daaf3aecc2c8468_JaffaCakes118.dll
-
Size
16KB
-
MD5
eab5d6ca956b75320daaf3aecc2c8468
-
SHA1
2dd68f5c93324a8ded04018743571daeda94adff
-
SHA256
9267f69a0f6754cfa5417de5dc3fbb2520af78030db3c3c8c644edcd4d2bb792
-
SHA512
127474b827d167d6d8e0133acb9a6812eb861dd2e2c2debdf41eb3de82d9a6b5d4ef99e393f18460b723a77811e91b88c86fbcd27c405f55504a36d5ce6b0aad
-
SSDEEP
192:ZWMHvcbSWObklOzx62+3lwDjMuBBQ6PRQkmwmqdsw+A4Jay:EMHvcHkkibwl6jMuBBQARQkm2dsVnZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5004 wrote to memory of 2756 5004 rundll32.exe 82 PID 5004 wrote to memory of 2756 5004 rundll32.exe 82 PID 5004 wrote to memory of 2756 5004 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eab5d6ca956b75320daaf3aecc2c8468_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eab5d6ca956b75320daaf3aecc2c8468_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2756
-