Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
064955cd7d6d39088ed5c13866ddda47_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
064955cd7d6d39088ed5c13866ddda47_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
064955cd7d6d39088ed5c13866ddda47_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
064955cd7d6d39088ed5c13866ddda47
-
SHA1
2b756fbf6a15a22faa1a6285645c0527bf2a7a9a
-
SHA256
0351d634039926bb70146d98f545409cc951c8f735a7cb123cbef81b1eda2aa3
-
SHA512
26f7720e90cc92d3585e8722ff1af5ef01f5249a870148ebeb85e60ccc363c1e72381f59f3cc79fd7a1c576e4742b598e47991dc64b16a2498c269251dc53276
-
SSDEEP
24576:+ZeOdOMVw1dvZFI4LFNZZIL623FxTaS/wLPyKhX:sVUCCRTLL7WxxT4LPyKhX
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2596 wrote to memory of 4348 2596 rundll32.exe 82 PID 2596 wrote to memory of 4348 2596 rundll32.exe 82 PID 2596 wrote to memory of 4348 2596 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\064955cd7d6d39088ed5c13866ddda47_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\064955cd7d6d39088ed5c13866ddda47_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4348
-