Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
efdbbf9a9aff2f77852b6e44ae365c5d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efdbbf9a9aff2f77852b6e44ae365c5d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
efdbbf9a9aff2f77852b6e44ae365c5d_JaffaCakes118.dll
-
Size
84KB
-
MD5
efdbbf9a9aff2f77852b6e44ae365c5d
-
SHA1
8fe13bd5ca2501516067f7a48257d8b1e676c61d
-
SHA256
00257cd67176c05118f46fb282f83162ec13e1fcfac4ff72983361e308f60d52
-
SHA512
0baaca305499b638e5d2097b5b3b52c27f2154fc71f2f01f2bdaf610b4ea0e3e3f07206abe00130a0e3fdcefd48d3947649ce9e5a93fbc915a72790bd175d4c1
-
SSDEEP
1536:gYppXwTGyPTedlaV2mghScEvl1Aw88AWIxvbUX6I4uXHCq:jjdyUabgkXvPAB85IVVsP
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1320 2928 rundll32.exe 82 PID 2928 wrote to memory of 1320 2928 rundll32.exe 82 PID 2928 wrote to memory of 1320 2928 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\efdbbf9a9aff2f77852b6e44ae365c5d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\efdbbf9a9aff2f77852b6e44ae365c5d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1320
-