Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 16:24
Static task
static1
Behavioral task
behavioral1
Sample
fee8f9bf945d3156ccc3c7175eaf2d7a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fee8f9bf945d3156ccc3c7175eaf2d7a_JaffaCakes118.dll
Resource
win10v2004-20240910-en
General
-
Target
fee8f9bf945d3156ccc3c7175eaf2d7a_JaffaCakes118.dll
-
Size
32KB
-
MD5
fee8f9bf945d3156ccc3c7175eaf2d7a
-
SHA1
07443b2c92a586aac65f90f2746d3e8a77982a50
-
SHA256
3fe457ec01a081f1fcb1695d5f1f2e4c840a11d9992fa4aac10aeae728906557
-
SHA512
cdb9a65c0123c925a828354f54dbbc96b4e4b82fcd51d19bb9a83498d9df366f610e002307fb2b6659a52c0070623be92d00ba7d7e936e1df9133b0506da341c
-
SSDEEP
768:ukSdpeSTmTwmpErku/7yubDiKdoiDzhqDrRBSFMs:ukSdMSTlmpi7yODqCkPRUFL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 456 wrote to memory of 2940 456 rundll32.exe 84 PID 456 wrote to memory of 2940 456 rundll32.exe 84 PID 456 wrote to memory of 2940 456 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fee8f9bf945d3156ccc3c7175eaf2d7a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fee8f9bf945d3156ccc3c7175eaf2d7a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2940
-