Analysis
-
max time kernel
94s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
0979780ca4a3647cba204a78e8d051c4_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0979780ca4a3647cba204a78e8d051c4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0979780ca4a3647cba204a78e8d051c4_JaffaCakes118.dll
-
Size
28KB
-
MD5
0979780ca4a3647cba204a78e8d051c4
-
SHA1
a87afa981e61976752f24c4d1237ac92fdbb7a08
-
SHA256
de60f79553ef9106bc50a48ebcc1e618e01b370bc8e1632350b4b574faba9376
-
SHA512
afbfebb5c997f10d500c451e7b91b3210889ba5a9c282fc029888dfff6935e43d399e287bfd1197c07494ecbb19afbaa7af4f2b9311ef129ae65de7224e7bb16
-
SSDEEP
768:jV0K7BFkJbham+qg+wJHTxuWqCs2+JylIdTpb:pHiFbIJAB9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4124 rundll32.exe 4124 rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4124 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3828 wrote to memory of 4124 3828 rundll32.exe 83 PID 3828 wrote to memory of 4124 3828 rundll32.exe 83 PID 3828 wrote to memory of 4124 3828 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0979780ca4a3647cba204a78e8d051c4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0979780ca4a3647cba204a78e8d051c4_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4124
-