Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 19:21
Static task
static1
Behavioral task
behavioral1
Sample
02e84ed4f750dd16cfb7566ca452073f_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
02e84ed4f750dd16cfb7566ca452073f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
02e84ed4f750dd16cfb7566ca452073f_JaffaCakes118.dll
-
Size
33KB
-
MD5
02e84ed4f750dd16cfb7566ca452073f
-
SHA1
925f5639515318fba03ffac2ab32e80243d0a072
-
SHA256
d353040a3b7dcc58dc86773af72a4bf1f3550cb4b7b0dc9b2f3323af5d32199a
-
SHA512
4d5768bc3b3ccebdff8d66181cebd55bb3bb2903132f6f67101293768a1f407ad6ae52f1372b718b2ed6a541910553e19af84339868c19ea7eaf3172aece7a80
-
SSDEEP
768:cf/fosuj44q2F3FLBa7H7Qt7kZYnhYDLR0NR:unozB4bY7kZ0+vR0/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2624 2636 rundll32.exe 82 PID 2636 wrote to memory of 2624 2636 rundll32.exe 82 PID 2636 wrote to memory of 2624 2636 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\02e84ed4f750dd16cfb7566ca452073f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\02e84ed4f750dd16cfb7566ca452073f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2624
-