Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 10:54
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fe6047f7aa23ca8f38e15c3bdd8921c5_JaffaCakes118.dll
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
fe6047f7aa23ca8f38e15c3bdd8921c5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
fe6047f7aa23ca8f38e15c3bdd8921c5_JaffaCakes118.dll
-
Size
3KB
-
MD5
fe6047f7aa23ca8f38e15c3bdd8921c5
-
SHA1
0d5f8534af90061b4bf8841288cf53dc729dbb58
-
SHA256
0061229d3d9029c9e83a5cf61959dd519ab4c06989298d2dea7e3e9585817cf5
-
SHA512
1297ea63a7593e42db5ab8086ce8d6b9bf8c8cf8cc2b4857d33ae6cae13fd703e136d1334a9a5a114be972c042d9b21f82d0eb03288e015de1221645c2ec1e40
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2960 wrote to memory of 5092 2960 rundll32.exe 83 PID 2960 wrote to memory of 5092 2960 rundll32.exe 83 PID 2960 wrote to memory of 5092 2960 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe6047f7aa23ca8f38e15c3bdd8921c5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe6047f7aa23ca8f38e15c3bdd8921c5_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5092
-