Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 05:36
Static task
static1
Behavioral task
behavioral1
Sample
f9d0ae6152e7a2b158b6f6182e67f1eb_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f9d0ae6152e7a2b158b6f6182e67f1eb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f9d0ae6152e7a2b158b6f6182e67f1eb_JaffaCakes118.dll
-
Size
177KB
-
MD5
f9d0ae6152e7a2b158b6f6182e67f1eb
-
SHA1
364148ddf97af17f1c6ffc210eaf51cad0b22390
-
SHA256
a1c984652d1e8fd7676dc0d1d0408ad4bb8f04a69e666b8cf6b31dbd411272c4
-
SHA512
59d6c18e32bd6680cc6b58bd72531edeb5fbd24bbd4ab88978bc02226442b320029c4c8bd22acccd9055362a3b652b63fab5ed2a55e107b29e914a3d00d9b1fb
-
SSDEEP
3072:uWGWSEj1j0DEx4SMMdRPv8oiD06IPXbc7bL56lZFoEOqOerZmtGh5p:Nj1j0DEx4SMMdRn8ND0B/IL56lZ6Ub
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1196 wrote to memory of 4692 1196 rundll32.exe 82 PID 1196 wrote to memory of 4692 1196 rundll32.exe 82 PID 1196 wrote to memory of 4692 1196 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9d0ae6152e7a2b158b6f6182e67f1eb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9d0ae6152e7a2b158b6f6182e67f1eb_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4692
-