Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 02:07
Static task
static1
Behavioral task
behavioral1
Sample
03fda86d2a96636bedfc09bfcd2a3e28_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03fda86d2a96636bedfc09bfcd2a3e28_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
03fda86d2a96636bedfc09bfcd2a3e28_JaffaCakes118.dll
-
Size
51KB
-
MD5
03fda86d2a96636bedfc09bfcd2a3e28
-
SHA1
bc03d6fa95254e626452377feeec91ae10bd8267
-
SHA256
62827f7ab4eeab5931010f2c3c6ec12d501914aa83d26c6e8b33930781270fd7
-
SHA512
e1f8f94f43050451969db42e59f468f17d1d6a0cd45cb78dc324ed4e37010fbd0fb6dfffd2300d4bc61ca1852efc670af7740a1d653fb45d3c353d8fa8e64f29
-
SSDEEP
1536:BfQAl+7ovOI1pljmt9EJejtGkkFbXZ8+nUSG:dQAl+pm7oxtGkyZ8zSG
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4564 wrote to memory of 3292 4564 rundll32.exe 82 PID 4564 wrote to memory of 3292 4564 rundll32.exe 82 PID 4564 wrote to memory of 3292 4564 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03fda86d2a96636bedfc09bfcd2a3e28_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03fda86d2a96636bedfc09bfcd2a3e28_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3292
-