Analysis
-
max time kernel
135s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 22:25
Static task
static1
Behavioral task
behavioral1
Sample
ee8b3957a96ad85778cb45e78b1864de_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee8b3957a96ad85778cb45e78b1864de_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ee8b3957a96ad85778cb45e78b1864de_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
ee8b3957a96ad85778cb45e78b1864de
-
SHA1
3dbff7c8861feed84928efc68afd3cd0333ed6a8
-
SHA256
64b2f32c8a9776cb96820b9054f0d27045472249867c7638c9646ad15c3591de
-
SHA512
a5845a69fdd84969038a43fb7b05f3be42bb3242b8062bb8fac831b4bd8cf701415c539b18a0da0eb86cb6aa48073de98fc4c7b9320c02cb74aed7dc0d4fce4c
-
SSDEEP
24576:eQH/4kpx07M4py2n6ATIzRcburs6rQMwsvS9nvgFzYAV/2JF4FohEeUmfXAMY4QP:eQf4ax07txujrQRsvStgFPk4Aiv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2320 2368 rundll32.exe 84 PID 2368 wrote to memory of 2320 2368 rundll32.exe 84 PID 2368 wrote to memory of 2320 2368 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee8b3957a96ad85778cb45e78b1864de_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee8b3957a96ad85778cb45e78b1864de_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2320
-