Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 07:03
Static task
static1
Behavioral task
behavioral1
Sample
ead012f21bfc73037419a665ee4d43bc_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ead012f21bfc73037419a665ee4d43bc_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ead012f21bfc73037419a665ee4d43bc_JaffaCakes118.dll
-
Size
49KB
-
MD5
ead012f21bfc73037419a665ee4d43bc
-
SHA1
20b9a64e4ff0e213946c80156a9ccc02b167d60a
-
SHA256
48a20fdbb211240c02f33d70a4a04c75cd70d73fe13e07d795fb42006434a04f
-
SHA512
f5c493d107987faf9de444f01dd20db3e5d92ecac704290e8c07c96dcbeafa5dab0c1709d7292915b5d72f6d1ab2921316c3414fc12814f3b7a0624dee46b724
-
SSDEEP
1536:Mjv6bh+eSumWEv5xFQiMGv55kAK+wENXr:Ev6bh+TTiiMGvUAKJ2Xr
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3068 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1880 wrote to memory of 3068 1880 rundll32.exe 82 PID 1880 wrote to memory of 3068 1880 rundll32.exe 82 PID 1880 wrote to memory of 3068 1880 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ead012f21bfc73037419a665ee4d43bc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ead012f21bfc73037419a665ee4d43bc_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3068
-