Analysis
-
max time kernel
94s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 03:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
08c13bac542f5fb0099a530f26b749ae_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
3 signatures
150 seconds
General
-
Target
08c13bac542f5fb0099a530f26b749ae_JaffaCakes118.dll
-
Size
336KB
-
MD5
08c13bac542f5fb0099a530f26b749ae
-
SHA1
898ed4e10f7eab3a1d2493d7df49b3a370c9a60c
-
SHA256
d9d8d7a716947c50d700b3f7b4ade02ded317ed2096775ea6338503e6eeda5d1
-
SHA512
a1a90bb5878d47acdfc9d55e326ac1bf9edcfe7d6a67823f8b10c6a108d28cc92ff887ed823f8c0ca59dcdfce5580239450339002359ed542bbc885759df347d
-
SSDEEP
3072:jDKpt9sSR0HUHPwZWLnWVfEAzV2IJIwTBftpmc+z+f3Q0m:jDgtfRQUHPw06MoV2nwTBlhm8u
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3824 wrote to memory of 2960 3824 rundll32.exe 82 PID 3824 wrote to memory of 2960 3824 rundll32.exe 82 PID 3824 wrote to memory of 2960 3824 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\08c13bac542f5fb0099a530f26b749ae_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\08c13bac542f5fb0099a530f26b749ae_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2960
-