Analysis
-
max time kernel
92s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
eac6b431a7f1930ece2db87e2e7e8e81_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
eac6b431a7f1930ece2db87e2e7e8e81_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eac6b431a7f1930ece2db87e2e7e8e81_JaffaCakes118.dll
-
Size
95KB
-
MD5
eac6b431a7f1930ece2db87e2e7e8e81
-
SHA1
8c2657ad34016109fad9e17fdb28630d3921f137
-
SHA256
555e4f274e2def5b28dd475e04834c19f11efc9ff4bc74cc26c42ccdf25792ce
-
SHA512
35baf3743c15be1ace8609723667e8821aba1d4f2a7d1dd345bc18e89e8b33abfb8c071459f1648f8110d77be17c725da7e4b757857c8c9c5802c965c4b8ff54
-
SSDEEP
1536:p8Sfuk63byE0p9HDZYG/198Agm9o15BrzrpirEE5j9rgsp:p8SmB+ppDZv11CXrpirEE55vp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3516 wrote to memory of 4956 3516 rundll32.exe 82 PID 3516 wrote to memory of 4956 3516 rundll32.exe 82 PID 3516 wrote to memory of 4956 3516 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eac6b431a7f1930ece2db87e2e7e8e81_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eac6b431a7f1930ece2db87e2e7e8e81_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4956
-