Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 02:28
Static task
static1
Behavioral task
behavioral1
Sample
fb53fa97311b4f7497d5580520d18371_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fb53fa97311b4f7497d5580520d18371_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fb53fa97311b4f7497d5580520d18371_JaffaCakes118.dll
-
Size
55KB
-
MD5
fb53fa97311b4f7497d5580520d18371
-
SHA1
ded72609e03d563d3a0d3247292149595da85937
-
SHA256
43ca1b130e9d90818f8564d6bf230e37d168842c53ab0573de946aff60870283
-
SHA512
8bf0c9e3488cac2390866821a2472dec93adf21ff752ff042bce5a88765837171683490e7774b1b961b8f0e74c60ed0abda1b83f7f6ebdcc4d4c697b2cecae62
-
SSDEEP
768:+lp51R7a7fVusGlcuAZ325PATIcS4W73hSYa2Va2Ghk8G0tOffL2J+:+lBZa79us1qATpWYvma2ek8G0tOffL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 544 wrote to memory of 4816 544 rundll32.exe 82 PID 544 wrote to memory of 4816 544 rundll32.exe 82 PID 544 wrote to memory of 4816 544 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb53fa97311b4f7497d5580520d18371_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb53fa97311b4f7497d5580520d18371_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4816
-