Analysis
-
max time kernel
93s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 15:32
Static task
static1
Behavioral task
behavioral1
Sample
0213307785acdc442fe52ff14e2ac59b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0213307785acdc442fe52ff14e2ac59b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0213307785acdc442fe52ff14e2ac59b_JaffaCakes118.dll
-
Size
224KB
-
MD5
0213307785acdc442fe52ff14e2ac59b
-
SHA1
f5dddf6b153fd7adff66a934eb523318e02b792b
-
SHA256
8fa2c1ceb452a64aed1512df9405c8c565c148c4419c58b4e72f45eb3447c377
-
SHA512
138a7b704b686d0a164b492354bbb063c40aec5fdf0f95bf9e2c39d8505d69c71cd5558f1df2f11fe2db65b582b7e96b622b1059cabfeaae23cae6a745040308
-
SSDEEP
3072:sVp2CPdvNpScUXiPJFbQ9rjELPR2ouozvh:op2CPdlpScUXsDhPR2ohh
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1484 wrote to memory of 2040 1484 rundll32.exe 82 PID 1484 wrote to memory of 2040 1484 rundll32.exe 82 PID 1484 wrote to memory of 2040 1484 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0213307785acdc442fe52ff14e2ac59b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0213307785acdc442fe52ff14e2ac59b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2040
-