Analysis
-
max time kernel
135s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 05:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fddd273e3931ad3a84c30b40206293f8_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
fddd273e3931ad3a84c30b40206293f8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
fddd273e3931ad3a84c30b40206293f8_JaffaCakes118.dll
-
Size
3KB
-
MD5
fddd273e3931ad3a84c30b40206293f8
-
SHA1
714552620238c2d12b8e0c048bbb68518502799c
-
SHA256
1a16c94bda0fd7cef9e6a4c3022f6f57ee3e0cd78dc523a8a66739cfdc40a795
-
SHA512
f1fa3154b54e9e4518352e412b8d3c785a2c0021b2abba18b10baf74d2f45defef19ee45e65d01777ff58ce4f6a9601b8b1286dc5e4c481b37e329a7881b1613
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3116 wrote to memory of 1228 3116 rundll32.exe 82 PID 3116 wrote to memory of 1228 3116 rundll32.exe 82 PID 3116 wrote to memory of 1228 3116 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fddd273e3931ad3a84c30b40206293f8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fddd273e3931ad3a84c30b40206293f8_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1228
-