Analysis
-
max time kernel
95s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
eacbd43682695372204991b784bed9b4_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacbd43682695372204991b784bed9b4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eacbd43682695372204991b784bed9b4_JaffaCakes118.dll
-
Size
261KB
-
MD5
eacbd43682695372204991b784bed9b4
-
SHA1
c8370bf84cf568ad8a04f12d559e643267615d64
-
SHA256
30f59a84d18f2b410ca348db9ea6337fd74bde56ce2ea5e22788832adff8c30b
-
SHA512
95694fad2b9148180dbebbc849de008b891ab3e07a98f84691aa16c2823ff83cbc1252ce2b9ca94465a486516e4936db0de5f66b26e6c192b52588559e76f3ae
-
SSDEEP
6144:LQzzPqpQd8BCLA6hQbpmOVB4MubnBKkl61vg:LqjqE8Wgmyubd61v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5108 wrote to memory of 3344 5108 rundll32.exe 82 PID 5108 wrote to memory of 3344 5108 rundll32.exe 82 PID 5108 wrote to memory of 3344 5108 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eacbd43682695372204991b784bed9b4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eacbd43682695372204991b784bed9b4_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3344
-