Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 11:11
Static task
static1
Behavioral task
behavioral1
Sample
f5e142b6f32fbb6bd9b149ad1bc4c4c7_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f5e142b6f32fbb6bd9b149ad1bc4c4c7_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f5e142b6f32fbb6bd9b149ad1bc4c4c7_JaffaCakes118.dll
-
Size
33KB
-
MD5
f5e142b6f32fbb6bd9b149ad1bc4c4c7
-
SHA1
f3637491ff8ebf8f35566cc3465556959d639d38
-
SHA256
e35ed8e436322fdc897a6d3fc873bd309ad1fefd4c52c509bc245d9f89f69b39
-
SHA512
c1108afc16816a2261c4dc0fd992eba34c7242de5152cb3446a8daf019d91d7b5f0bcc1d201b8da4f478da8017bc6bfad45edd288555c383aa933839aa9b4953
-
SSDEEP
768:Uwxwi/HjgOrbmSnhphNwxU72xv/Ion7Yo1l450hcDBWEERAbQS6P:Uwxw0jgOZTPr2lv7YoXBCLERAbQSi
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4680 wrote to memory of 4168 4680 rundll32.exe 85 PID 4680 wrote to memory of 4168 4680 rundll32.exe 85 PID 4680 wrote to memory of 4168 4680 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5e142b6f32fbb6bd9b149ad1bc4c4c7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5e142b6f32fbb6bd9b149ad1bc4c4c7_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4168
-