Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 10:07
Behavioral task
behavioral1
Sample
eb1b290656b065de3289e96bba505195_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb1b290656b065de3289e96bba505195_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eb1b290656b065de3289e96bba505195_JaffaCakes118.dll
-
Size
207KB
-
MD5
eb1b290656b065de3289e96bba505195
-
SHA1
1c32ba9a0e012c8bb25c8dadc00d4dcad97bfd8d
-
SHA256
0972de8a330d3954121afd9eebdabf3b3d3ff26c1d6a5f429a0b661879bcbcab
-
SHA512
7f8e54033a0e182b4b49d4f654770ea00973288b3f047f5c752c39ee2492a3c5c23a285b2991cd0ca8da92b03536b91b49289f65d9d484421c9022d5d52aaa34
-
SSDEEP
3072:KlC60GeD6N9Za5Yp6zPC952DmKX0tDV2/jqBkLcP6j5UNQ5c:KNxfaWUzPWEKKX0pURLcyjo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4384 wrote to memory of 3084 4384 rundll32.exe 82 PID 4384 wrote to memory of 3084 4384 rundll32.exe 82 PID 4384 wrote to memory of 3084 4384 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb1b290656b065de3289e96bba505195_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb1b290656b065de3289e96bba505195_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3084
-