Analysis
-
max time kernel
90s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 22:38
Static task
static1
Behavioral task
behavioral1
Sample
0382222123d7946620c2a4219a32296a_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0382222123d7946620c2a4219a32296a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0382222123d7946620c2a4219a32296a_JaffaCakes118.dll
-
Size
48KB
-
MD5
0382222123d7946620c2a4219a32296a
-
SHA1
4bc514512befdf09da5d6d86476435f9ff97be55
-
SHA256
b864e5a7f7a33cd16e078296724bd49519e0e9becd8c5598daf8b0bdc50d4247
-
SHA512
02ca8f64cb9348bd1a9c9e65ffae7afc57d401c9c05c243e3e73e2c83a90d247180682c988219303119b0ba0d692bc875b1dba0d1c15ab569a69258d58e5fad1
-
SSDEEP
768:IBDm7Lyc2WQ4zMVroiTyt6sfYIJ+9lfmL0:IBDmP3zRiTyt6sfY7l+L0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4524 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3180 wrote to memory of 4524 3180 rundll32.exe 84 PID 3180 wrote to memory of 4524 3180 rundll32.exe 84 PID 3180 wrote to memory of 4524 3180 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0382222123d7946620c2a4219a32296a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0382222123d7946620c2a4219a32296a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4524
-