Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 05:46
Static task
static1
Behavioral task
behavioral1
Sample
ef2c2d8464adbbc2c08bc5061bd9116d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef2c2d8464adbbc2c08bc5061bd9116d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ef2c2d8464adbbc2c08bc5061bd9116d_JaffaCakes118.dll
-
Size
84KB
-
MD5
ef2c2d8464adbbc2c08bc5061bd9116d
-
SHA1
bcb32e2065ab5bce9bf9c7ed39f31ff8df0af2ab
-
SHA256
2188b9badfed0ab3b6e814a8f71747d7bec3906c7214b40dadf22064bfdd8e4d
-
SHA512
f403d80f02790d9f32c090a550e53418fe85ac07b932c644db33473472405ab82467edb2917ead18cacb3c0f67e8836184123531915e5a0c4c584c152e67301a
-
SSDEEP
1536:NQ6LwPviWE0W1PhJfzTRfHuhckiw6ATr2OZtd:u6LwPE0W1PzVfHuCkiwlRZtd
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1428 wrote to memory of 4424 1428 rundll32.exe 82 PID 1428 wrote to memory of 4424 1428 rundll32.exe 82 PID 1428 wrote to memory of 4424 1428 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef2c2d8464adbbc2c08bc5061bd9116d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef2c2d8464adbbc2c08bc5061bd9116d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4424
-