Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:59
Static task
static1
Behavioral task
behavioral1
Sample
085b39b813b668fce71067664d0de410_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
085b39b813b668fce71067664d0de410_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
085b39b813b668fce71067664d0de410_JaffaCakes118.dll
-
Size
6KB
-
MD5
085b39b813b668fce71067664d0de410
-
SHA1
aff360da2822e637ee2bd9efd49e652d3e46619b
-
SHA256
05bde91c40403e93239e83230a91731089c696c15bc3982a9e7d6721cd980ded
-
SHA512
073dd8b71e177cc91ba820b96d127c5c9c746acdacc9e0d24b1f400a7155d3bb57f30c300d14ebf33318572444cc77732c4261312ecef84671a901a19a94e8f1
-
SSDEEP
96:nI2RrUeq9lAdwQ41gQehr5CJE1YSRR8nHH:XR4e2lApQepocDGHH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3016 wrote to memory of 1896 3016 rundll32.exe 82 PID 3016 wrote to memory of 1896 3016 rundll32.exe 82 PID 3016 wrote to memory of 1896 3016 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\085b39b813b668fce71067664d0de410_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\085b39b813b668fce71067664d0de410_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1896
-