Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 08:27
Static task
static1
Behavioral task
behavioral1
Sample
006227209b9fa7bd8e5db50322885d5e_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
006227209b9fa7bd8e5db50322885d5e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
006227209b9fa7bd8e5db50322885d5e_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
006227209b9fa7bd8e5db50322885d5e
-
SHA1
a3c8971325ce09a449d2d25743648c43e4dddf3a
-
SHA256
66f0f82a5dd98ab92e6d72c2dffa69c36a87ac26655670f83f21d38795f32308
-
SHA512
17ca58b9db9776e70d7584742a18cf39d5e8abfe0db9856b23fd9a63ad8fcd93c6836ec74935e2b7fc3c05343c180d4f5fa11cace47e5b8b7eb2f169a67e49b4
-
SSDEEP
12288:teJnurO3jEakAexUkhZ73zrmtDME31bv4pl+iOJec/IZaTqVTFGvXscHubCHRlH6:8n1IR3GpM61Y+iOoFZVkPXOGxV/e3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4484 wrote to memory of 3528 4484 rundll32.exe 82 PID 4484 wrote to memory of 3528 4484 rundll32.exe 82 PID 4484 wrote to memory of 3528 4484 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\006227209b9fa7bd8e5db50322885d5e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\006227209b9fa7bd8e5db50322885d5e_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3528
-