Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
0011080bb1cca77bbbce95128a927659_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0011080bb1cca77bbbce95128a927659_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0011080bb1cca77bbbce95128a927659_JaffaCakes118.dll
-
Size
68KB
-
MD5
0011080bb1cca77bbbce95128a927659
-
SHA1
d588f6ec564ba366b294f694aa00b96f1eccb703
-
SHA256
7c1ac32fbebdb1eb76ba37b821af89ddf5a458e0e63c189e736c14f00dea25dd
-
SHA512
e4bb0efdc1eeee8ff4840b7016a96fcbbe803d21827fecf449b249f66058068fa71cac1a5ae582ad28d506ad13983a19d773222acd6532e3c0e593a4c968bcd0
-
SSDEEP
1536:BfQAl+7ovOF+NhDglaNmBaw3jfQHtiiOHZE9Dr4DkRV/lsTCyVb6p:dQAl+pFHlGmB/fAtzuECDkRVtsTCyh6p
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4796 wrote to memory of 4804 4796 rundll32.exe 81 PID 4796 wrote to memory of 4804 4796 rundll32.exe 81 PID 4796 wrote to memory of 4804 4796 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0011080bb1cca77bbbce95128a927659_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0011080bb1cca77bbbce95128a927659_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4804
-