Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:05
Static task
static1
Behavioral task
behavioral1
Sample
eab9a31d76951b1dcab68941bbd226f0_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eab9a31d76951b1dcab68941bbd226f0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eab9a31d76951b1dcab68941bbd226f0_JaffaCakes118.dll
-
Size
6KB
-
MD5
eab9a31d76951b1dcab68941bbd226f0
-
SHA1
b7777c27dabf1a7e48c496b43114815564af2a48
-
SHA256
f17fad0a33a117709c667c6a2a46309317b7c65d4a63bf530d306fcefb2a182a
-
SHA512
8bc2c5d2f143056af810e81b480dbd1f4b1ac94f8c56e755024b3be57bce6f88ed3717d0482e2a65e7b775ace1d75ec6d565a896077a6391ccaf03a67dfc31f8
-
SSDEEP
48:aGycpK0ptbXbInpCdys9zTh38E4IIZWiw4z8XU5WwG2IozbC:xvLrTbjdysVTqeEW3E8XIWwG6b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2464 2472 rundll32.exe 82 PID 2472 wrote to memory of 2464 2472 rundll32.exe 82 PID 2472 wrote to memory of 2464 2472 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eab9a31d76951b1dcab68941bbd226f0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eab9a31d76951b1dcab68941bbd226f0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2464
-