Analysis
-
max time kernel
90s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
fb39462922fb216027a5191c3f6f629b_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fb39462922fb216027a5191c3f6f629b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fb39462922fb216027a5191c3f6f629b_JaffaCakes118.dll
-
Size
331KB
-
MD5
fb39462922fb216027a5191c3f6f629b
-
SHA1
4383632891d58bbc31fdb0464368efbc9bacb765
-
SHA256
f9f9b4c1ced5d84780ac4c36f03bebabad8fadef306bd57e83aacc8173b16be7
-
SHA512
a0b65277de80b8c26fd70226cc3b09801b2a07ab22e57e36c95a8a000bf31af68d7ef50ae1a750b327caa841aab00a99ac55483f5b25e2cf9d8cdbfeda5e0c0e
-
SSDEEP
6144:mzQaJAwgvWreQIkqr5JrZ+KPAr4hc0KwSU9ICZJ+TBQiJVHX3s4:jQgvWlqr5loec0TSU95+T3n
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3856 wrote to memory of 4104 3856 rundll32.exe 84 PID 3856 wrote to memory of 4104 3856 rundll32.exe 84 PID 3856 wrote to memory of 4104 3856 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb39462922fb216027a5191c3f6f629b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb39462922fb216027a5191c3f6f629b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4104
-