Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 19:22
Behavioral task
behavioral1
Sample
f2f52c78d594c37b546f6c09207cb481_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f2f52c78d594c37b546f6c09207cb481_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f2f52c78d594c37b546f6c09207cb481_JaffaCakes118.dll
-
Size
202KB
-
MD5
f2f52c78d594c37b546f6c09207cb481
-
SHA1
12bc1affe86327d9f78684cde46cfff4dee57149
-
SHA256
fa405c36d82b264568219b521886d2e7ef589674874983c7db1d67928003489e
-
SHA512
65a18a46c31ea25b9f6b55b56024c973b6af375e109cfafca9058c7570eb6e86ffdeb13c6fe663a8258c1146b04934cd638950aef5e9db70a31b6664392b362f
-
SSDEEP
3072:1jh9N4a1j712h9Td2+1lxvTeZna8xUhUbT15m:1jdFKdoSxvixTxUA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1912 2432 rundll32.exe 28 PID 2432 wrote to memory of 1912 2432 rundll32.exe 28 PID 2432 wrote to memory of 1912 2432 rundll32.exe 28 PID 2432 wrote to memory of 1912 2432 rundll32.exe 28 PID 2432 wrote to memory of 1912 2432 rundll32.exe 28 PID 2432 wrote to memory of 1912 2432 rundll32.exe 28 PID 2432 wrote to memory of 1912 2432 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f2f52c78d594c37b546f6c09207cb481_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f2f52c78d594c37b546f6c09207cb481_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1912
-