Analysis
-
max time kernel
93s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:55
Static task
static1
Behavioral task
behavioral1
Sample
eacd12f16a8cefd206b94c6d38a25b50_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eacd12f16a8cefd206b94c6d38a25b50_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eacd12f16a8cefd206b94c6d38a25b50_JaffaCakes118.dll
-
Size
163KB
-
MD5
eacd12f16a8cefd206b94c6d38a25b50
-
SHA1
1e5e693612a77368811ae45a20908f02aeee2c97
-
SHA256
3faadd92a5d32cb0c459c6d4d7f135497049e97619873d0cdf1423c15f30828a
-
SHA512
31e1e1ca6f53f56113933e09487f299662ff0a5e5831b04924447bb23456a0a52b9a3611f70986b3182b63c8d45d0b2b0777bc9c42ee1c3bc114faf3eb6b2537
-
SSDEEP
3072:G9EUqM1hrbSjQDxD4GD3OsV0jvmspNQz2L6OmADQc/dcfEvSnlgeua:G9EUqu/D4GFIOiNQSL66L3SyW
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1176 wrote to memory of 4380 1176 rundll32.exe 82 PID 1176 wrote to memory of 4380 1176 rundll32.exe 82 PID 1176 wrote to memory of 4380 1176 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eacd12f16a8cefd206b94c6d38a25b50_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eacd12f16a8cefd206b94c6d38a25b50_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4380
-