Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 20:55
Static task
static1
Behavioral task
behavioral1
Sample
fd208ce817a0dd24d5f5abc68af308ee_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd208ce817a0dd24d5f5abc68af308ee_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fd208ce817a0dd24d5f5abc68af308ee_JaffaCakes118.dll
-
Size
33KB
-
MD5
fd208ce817a0dd24d5f5abc68af308ee
-
SHA1
8eb8e389e724f8423c96ccad716b8058ee957e6c
-
SHA256
5343f6df8fc71ecf055d6a81c1d6701c59b1c9ed4db3737acac49ee5e2a8186c
-
SHA512
91408ff6bc7cac7c7a97cfd092509e685f2871811e2c3bef1a1b890d9a4cead2db8516c3dbdc258a34122311056c1cc091e52552db3a1974f03087b07dcbc9f9
-
SSDEEP
768:af/fosuj44q2F3FLBa7H7Qt7kZYnhYDLRKkS4:QnozB4bY7kZ0+vRKk1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4292 wrote to memory of 552 4292 rundll32.exe 82 PID 4292 wrote to memory of 552 4292 rundll32.exe 82 PID 4292 wrote to memory of 552 4292 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd208ce817a0dd24d5f5abc68af308ee_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd208ce817a0dd24d5f5abc68af308ee_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:552
-