Analysis
-
max time kernel
94s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 10:21
Static task
static1
Behavioral task
behavioral1
Sample
fe5242063146b35139411c5c5e83360d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe5242063146b35139411c5c5e83360d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
fe5242063146b35139411c5c5e83360d_JaffaCakes118.dll
-
Size
65KB
-
MD5
fe5242063146b35139411c5c5e83360d
-
SHA1
63c3eaf592c6a096d5a9fbc3ddaa9b75c0473c96
-
SHA256
a6e0abb72883b37d74edf1cb5aab2753911d97dee810c9d4d2acb1d3015ea09a
-
SHA512
3cc7016ea4bec4a62918f787f8d0021f4792e4c2ffc42fc3cc6f9bb3d90319d73ebdd7bb6c4bd57fee291a200253e06d24fe766171489841a93a134d4e466ea0
-
SSDEEP
1536:zpqcLXQaHUEqQi2pCUchNSNyLar2y84Kx:njf09QxCUcjSNVyyKx
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2888 wrote to memory of 868 2888 rundll32.exe 82 PID 2888 wrote to memory of 868 2888 rundll32.exe 82 PID 2888 wrote to memory of 868 2888 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe5242063146b35139411c5c5e83360d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe5242063146b35139411c5c5e83360d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:868
-