Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 01:16
Static task
static1
Behavioral task
behavioral1
Sample
eecb71e2027a4eec36aac7ccca5f54cb_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eecb71e2027a4eec36aac7ccca5f54cb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eecb71e2027a4eec36aac7ccca5f54cb_JaffaCakes118.dll
-
Size
192KB
-
MD5
eecb71e2027a4eec36aac7ccca5f54cb
-
SHA1
ccbc72d138039ba6b25bdd8d3824c4583f91c396
-
SHA256
24b234489bb0e438b4b07699520bd76f8ea7e9849bc4f6931704379e0dd740db
-
SHA512
518f10e634536c7ca76fefcb2a9927dbda13283bf3eb50afe7537a0dae349fe1998f8e6b53154228e54f9b5f1bcf1e49acb781b901e5b7b5b6fbb2124eb9bef4
-
SSDEEP
3072:lNbpOnPsGqQTruHLD7RcQxKrrdNU0VAtrOpOOWxOv4Kn7qbjx7T/Hrmb:lNbqaLD7RcukVAtSQOWcgWqbV77Lmb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1848 wrote to memory of 2900 1848 rundll32.exe 30 PID 1848 wrote to memory of 2900 1848 rundll32.exe 30 PID 1848 wrote to memory of 2900 1848 rundll32.exe 30 PID 1848 wrote to memory of 2900 1848 rundll32.exe 30 PID 1848 wrote to memory of 2900 1848 rundll32.exe 30 PID 1848 wrote to memory of 2900 1848 rundll32.exe 30 PID 1848 wrote to memory of 2900 1848 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eecb71e2027a4eec36aac7ccca5f54cb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eecb71e2027a4eec36aac7ccca5f54cb_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2900
-