Analysis
-
max time kernel
95s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 13:47
Static task
static1
Behavioral task
behavioral1
Sample
eb75da004455163d58cb0e95da446484_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb75da004455163d58cb0e95da446484_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eb75da004455163d58cb0e95da446484_JaffaCakes118.dll
-
Size
40KB
-
MD5
eb75da004455163d58cb0e95da446484
-
SHA1
10f1137e9157b2bef3a5a61c1487eaa1b4458ec6
-
SHA256
1d4cb30df1aab29623c4ba446e146019d91ef3bb14eb5b331b17227be759ba40
-
SHA512
18db2a277edb5262b7f6d44cfc1efa8f5df8fb6dd00d6468e5593926d1811bb863a09e77aa8cc9cdf56557f2c15a3416dcc61b66a07a680f50825c1bcef67bda
-
SSDEEP
768:NLY9qwqOV9h2N2Px2t2B2d2R2A0jTnRpRJ+BHFbLNO/DloKURp4jB+b:N89qwqOV9h2N2J2t2B2d2R2A0jTn3Rkk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4648 wrote to memory of 4120 4648 rundll32.exe 82 PID 4648 wrote to memory of 4120 4648 rundll32.exe 82 PID 4648 wrote to memory of 4120 4648 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb75da004455163d58cb0e95da446484_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb75da004455163d58cb0e95da446484_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4120
-