Analysis
-
max time kernel
93s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
fa506092ebb6c8e9ce5fa5f5980b79ad_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fa506092ebb6c8e9ce5fa5f5980b79ad_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fa506092ebb6c8e9ce5fa5f5980b79ad_JaffaCakes118.dll
-
Size
100KB
-
MD5
fa506092ebb6c8e9ce5fa5f5980b79ad
-
SHA1
351d4d37f93dc3dfcbc2a61765d8aa3fed6824c6
-
SHA256
cfbe5bc60512fc5a82eed91dbd0ccd9bcbf09204154356e3af7920c92a65309e
-
SHA512
fbbefe0091f6a1d01bee9a4ac9e9d2f5c36c8480e8a6dbdd582b18fc5831846b97fff5c7a7b485d6c9ec0bb270f0867a5fdd488dbca1cf6000dc90acca5854e8
-
SSDEEP
3072:NVuzz3gbnOd7dponOI2O/j8XQqGgZ0weXiaBE2u:NVQwbOd7dpoOhG3c0Bic
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4632 wrote to memory of 4028 4632 rundll32.exe 82 PID 4632 wrote to memory of 4028 4632 rundll32.exe 82 PID 4632 wrote to memory of 4028 4632 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa506092ebb6c8e9ce5fa5f5980b79ad_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fa506092ebb6c8e9ce5fa5f5980b79ad_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4028
-