Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
faaaa5bfbf2e306cc6c239f1d6b02900_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
faaaa5bfbf2e306cc6c239f1d6b02900_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
faaaa5bfbf2e306cc6c239f1d6b02900_JaffaCakes118.dll
-
Size
285KB
-
MD5
faaaa5bfbf2e306cc6c239f1d6b02900
-
SHA1
0029fa653c1a173f13a6ae1fe3ed257164fe6a42
-
SHA256
2786788d65cdad85884673d07c598b215221b07e36ce71cfbc910e0a2fb9c769
-
SHA512
4bbdc0df8f743f3decbad4099939b0c4ab2d1c2c4f8d212e829eb28961f05f213192e00437be03cf0ec2b17943fe9dfb3a6194744fbf807c41216686262535cb
-
SSDEEP
6144:tTE25Y5extTZU5/FI5Ee1Xg9Hrvmo6ekLw01JRE+ZgVRgs09OPpo8Wl1C:tt5Y5extTZU5/FI5Lcyo6ekU01JRE+GL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1340 2104 rundll32.exe 82 PID 2104 wrote to memory of 1340 2104 rundll32.exe 82 PID 2104 wrote to memory of 1340 2104 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\faaaa5bfbf2e306cc6c239f1d6b02900_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\faaaa5bfbf2e306cc6c239f1d6b02900_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1340
-