Analysis
-
max time kernel
93s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
ef88097e80fede9b2fa29d7232a90a6f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef88097e80fede9b2fa29d7232a90a6f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ef88097e80fede9b2fa29d7232a90a6f_JaffaCakes118.dll
-
Size
33KB
-
MD5
ef88097e80fede9b2fa29d7232a90a6f
-
SHA1
a52efdfe15c2307c34e33be22bbe21ca37ec5bc4
-
SHA256
3633375ef66bd9d3e3f3b064c173c8daea3c43f6f3ae1d0a02de1ad1c06b24c4
-
SHA512
06998ed7e1028ccf901d9e0c8a051209cab4ecdc810c6d807330d788f49738ed57b70672cae5cc693377526f34f76c594ca8e49a78647d63a84457a6d714c745
-
SSDEEP
768:s8pjghrK5eEOyzNqi9UHjA7Vsc7vHFT35hcDCsjpRZd/aI:s8pjarK5eNH8X7vlTpCusjpRz/5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1944 wrote to memory of 628 1944 rundll32.exe 82 PID 1944 wrote to memory of 628 1944 rundll32.exe 82 PID 1944 wrote to memory of 628 1944 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef88097e80fede9b2fa29d7232a90a6f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef88097e80fede9b2fa29d7232a90a6f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:628
-