Analysis
-
max time kernel
94s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:31
Behavioral task
behavioral1
Sample
0843436d89805cb9f6c4903c22f2f80d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0843436d89805cb9f6c4903c22f2f80d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0843436d89805cb9f6c4903c22f2f80d_JaffaCakes118.dll
-
Size
257KB
-
MD5
0843436d89805cb9f6c4903c22f2f80d
-
SHA1
9e82a1a7fd1fc7bdcb2bd42c54fbf4a91e355f0f
-
SHA256
033431df4e18e16df9a88e8eda70e0408599314e382e531675ccec829eef6906
-
SHA512
aec811b83a8b40abe41bac871e31f722c05d84a396f410eb9e12c543696a4f40460da44c2c0175c5a69b56ce835cb6be258f014ac26695e5c9590baff05cb424
-
SSDEEP
6144:N2BwjEiNaGeypOjwjJDTTRwf76m9hzTrNTBl8:NCwjRNxey1jNh+79h3rNT38
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2032 1872 rundll32.exe 81 PID 1872 wrote to memory of 2032 1872 rundll32.exe 81 PID 1872 wrote to memory of 2032 1872 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0843436d89805cb9f6c4903c22f2f80d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0843436d89805cb9f6c4903c22f2f80d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2032
-