Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
fb9383a9dc4219bc03bb595eabc0879f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb9383a9dc4219bc03bb595eabc0879f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fb9383a9dc4219bc03bb595eabc0879f_JaffaCakes118.dll
-
Size
47KB
-
MD5
fb9383a9dc4219bc03bb595eabc0879f
-
SHA1
38d23367974467928b23e1c5780bc47fea9f9532
-
SHA256
79866adb4a2253fa8f092d50cb93ee1bd0d1bd55649ae3b5f5ff24e3ed57119b
-
SHA512
43ae3d0fb117d7e79f4c534b744400db8946625cf577001e75b24609cff1263693ddb999cd49c3339b7ef30d2f67c6da90eecf27aa0957953852c903a41ba6e4
-
SSDEEP
768:UhidWKPv/JsdkkD+uN5/22ePrRpQaqjsr8SDUdPVz2L8JfL30F:UcdXv/JsXDf5OxRxqjsr8tdPVKLoDEF
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4384 wrote to memory of 3084 4384 rundll32.exe 82 PID 4384 wrote to memory of 3084 4384 rundll32.exe 82 PID 4384 wrote to memory of 3084 4384 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb9383a9dc4219bc03bb595eabc0879f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fb9383a9dc4219bc03bb595eabc0879f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3084
-