Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 15:17
Static task
static1
Behavioral task
behavioral1
Sample
06521b9b5709f684a38ee87678cbb2b6_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
06521b9b5709f684a38ee87678cbb2b6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
06521b9b5709f684a38ee87678cbb2b6_JaffaCakes118.dll
-
Size
48KB
-
MD5
06521b9b5709f684a38ee87678cbb2b6
-
SHA1
7c4d50295ef39559c4e6766cf4ac884ac89f36d4
-
SHA256
e7226ca96d5054282e30014a63045a8c72dfd7ce5a5ac5145ea305d5f4918098
-
SHA512
0717ca1bc5a2ed19ddb62305c5b072a8f3b4dedfecf13cd5b2bd22a2b89a27bdff0937b504eebf9b4647d764909aa4844da621ebdaaea824fb495320c9d90774
-
SSDEEP
768:IBDm7Lyc2WQ4zMVroiTyt6sfYIJ+9lfmL0:IBDmP3zRiTyt6sfY7l+L0
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 208 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4864 wrote to memory of 208 4864 rundll32.exe 82 PID 4864 wrote to memory of 208 4864 rundll32.exe 82 PID 4864 wrote to memory of 208 4864 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06521b9b5709f684a38ee87678cbb2b6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06521b9b5709f684a38ee87678cbb2b6_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:208
-