Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
083ca5fb942aee859c2d99aaad090df2_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
083ca5fb942aee859c2d99aaad090df2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
083ca5fb942aee859c2d99aaad090df2_JaffaCakes118.dll
-
Size
3KB
-
MD5
083ca5fb942aee859c2d99aaad090df2
-
SHA1
4ebf3d3bb18f32dc601c7332d67a86c4cdda9975
-
SHA256
e2331ed03f85e853a293b67a4093f490d0709fdf728c60110b4a19837dcdab1a
-
SHA512
11eac9491eea98b5b7fe94ec7261dc32390fa7099e8879d1f975b30d4a1e3c7f3f8ffe0038aecb63e004bd3b746b522b0bb571f07da3f533c204820be5c96301
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4132 wrote to memory of 3956 4132 rundll32.exe 82 PID 4132 wrote to memory of 3956 4132 rundll32.exe 82 PID 4132 wrote to memory of 3956 4132 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\083ca5fb942aee859c2d99aaad090df2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\083ca5fb942aee859c2d99aaad090df2_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3956
-