Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
f089b2ab81a7c3ecca114f7aab684366_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f089b2ab81a7c3ecca114f7aab684366_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f089b2ab81a7c3ecca114f7aab684366_JaffaCakes118.dll
-
Size
33KB
-
MD5
f089b2ab81a7c3ecca114f7aab684366
-
SHA1
ce5176393943aea3f5048f71065690c97684e3d4
-
SHA256
9a44defc47f55534ccc2f0a8014aca3178e82e9c3b8d45bd84cec5b6c86f93d8
-
SHA512
be06f9acbf17a0cc6a9a0948c847cdd9f574807c2ecd0407ac1d934a3d4b2f683283f57aa8ef34a4e5bd96b6a6809c41d5b695737d293ebce4ac477be6aeaf54
-
SSDEEP
768:GCC39bq5oxE2AdR40kYO2lg7EW1DdgI5hqDMTR5b+b:GCwgAEw0kY87EWddgWk+Rd+b
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3824 wrote to memory of 4204 3824 rundll32.exe 82 PID 3824 wrote to memory of 4204 3824 rundll32.exe 82 PID 3824 wrote to memory of 4204 3824 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f089b2ab81a7c3ecca114f7aab684366_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f089b2ab81a7c3ecca114f7aab684366_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4204
-