Analysis
-
max time kernel
94s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 17:50
Static task
static1
Behavioral task
behavioral1
Sample
06cbed5ffc3c75ab5a48bbd96a671c60_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06cbed5ffc3c75ab5a48bbd96a671c60_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
06cbed5ffc3c75ab5a48bbd96a671c60_JaffaCakes118.dll
-
Size
5KB
-
MD5
06cbed5ffc3c75ab5a48bbd96a671c60
-
SHA1
20c745d412488afaaec0cc526ad8ed5306c8cb29
-
SHA256
16f52524119fa3eaa26b00272e36f32e6a29401dedb8899434c011092164f7aa
-
SHA512
3e8425296d3170e49a75f7683ffe7b46113b3ac1f868b1e2410da977bd9cb9c03eac60988453b6caa18545fc0d43048068bd7381b4233537bc18f0fddbc85d8b
-
SSDEEP
48:iYbAgC8j1gAVAHoyrhWR0hiIsilOdQUgOrnsB/uSi20UcqbCWX:bbAuRnqoyrY0AI/lBkn/00jWb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3436 wrote to memory of 4556 3436 rundll32.exe 83 PID 3436 wrote to memory of 4556 3436 rundll32.exe 83 PID 3436 wrote to memory of 4556 3436 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06cbed5ffc3c75ab5a48bbd96a671c60_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\06cbed5ffc3c75ab5a48bbd96a671c60_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4556
-