Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 01:04
Static task
static1
Behavioral task
behavioral1
Sample
fd7f5a86b184e58a34b5d6d0d73c2543_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fd7f5a86b184e58a34b5d6d0d73c2543_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fd7f5a86b184e58a34b5d6d0d73c2543_JaffaCakes118.dll
-
Size
355KB
-
MD5
fd7f5a86b184e58a34b5d6d0d73c2543
-
SHA1
33ace7ba9683e38efdffd7181cd81c04cf5df28c
-
SHA256
d031932237d938d492e73ecb95c6814c7f6388374a86f25727acee6a60575901
-
SHA512
569da5260eb2211314d54743baa3909e6c67a294f195e2a13ccdff5d3823cc2389098486fc4b17d77c3e0dcc0669247154b5256974abf3e697e3ca694727333e
-
SSDEEP
6144:trU8ixXQuamo+IU7kH2Cd+2wj1KgwcIfiyrsd5:p2paffWC1wjWcIfs5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4956 wrote to memory of 3832 4956 rundll32.exe 82 PID 4956 wrote to memory of 3832 4956 rundll32.exe 82 PID 4956 wrote to memory of 3832 4956 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd7f5a86b184e58a34b5d6d0d73c2543_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fd7f5a86b184e58a34b5d6d0d73c2543_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3832
-