Analysis
-
max time kernel
93s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
00b3b6b754186185ab2cef5ada1e7b20_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00b3b6b754186185ab2cef5ada1e7b20_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
00b3b6b754186185ab2cef5ada1e7b20_JaffaCakes118.dll
-
Size
35KB
-
MD5
00b3b6b754186185ab2cef5ada1e7b20
-
SHA1
2c31af6958cf4846f98874dfbe81ffbf84756f86
-
SHA256
d5599d6d784c42593e57bbedd856870dc2a1ad896fb596d42501f96760e44278
-
SHA512
f40824ac6267bd0eec2800b58b7be84298252fec816fbf79fc49eda65f5d068d0e5a0802d65f05dc6fbc405c6042c2a75a260c6a83a7508a5a066d23f94712a3
-
SSDEEP
768:eSVslgsR16D1646Y8D55U7W4EXXIN/nNwRwxeD5:eSVstk8D07W4E+/iRwU9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5016 wrote to memory of 516 5016 rundll32.exe 82 PID 5016 wrote to memory of 516 5016 rundll32.exe 82 PID 5016 wrote to memory of 516 5016 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00b3b6b754186185ab2cef5ada1e7b20_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\00b3b6b754186185ab2cef5ada1e7b20_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:516
-