Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 08:12
Static task
static1
Behavioral task
behavioral1
Sample
fa0ae85af768c7e721c7f655514a6049_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa0ae85af768c7e721c7f655514a6049_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fa0ae85af768c7e721c7f655514a6049_JaffaCakes118.dll
-
Size
19KB
-
MD5
fa0ae85af768c7e721c7f655514a6049
-
SHA1
afa8df3cb6fa856fc4edc170e2e06f66da13a842
-
SHA256
bdf3abf403a40a233fe5e869c7e95a01ac5323066477f5442f711752cc882833
-
SHA512
f4dc227e18e50cb37d62f7a6e87a85581bd22b7873b47a9932e652fc29a87139a5d1e2a3ef8b5e33718c69dd88ede6206d0e300bc45ea62252f7f507f02139aa
-
SSDEEP
384:t8BkITi93mbqXR4kI6BXs8jPY1yJpJgLa0MpLi+A:gkci9WCDXs8brgLa1M
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3472 wrote to memory of 2836 3472 rundll32.exe 82 PID 3472 wrote to memory of 2836 3472 rundll32.exe 82 PID 3472 wrote to memory of 2836 3472 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa0ae85af768c7e721c7f655514a6049_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa0ae85af768c7e721c7f655514a6049_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2836
-