Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 14:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0b0b80bb7c47ae1f6ec6ec82709b2966_JaffaCakes118.dll
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0b0b80bb7c47ae1f6ec6ec82709b2966_JaffaCakes118.dll
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
0b0b80bb7c47ae1f6ec6ec82709b2966_JaffaCakes118.dll
-
Size
3KB
-
MD5
0b0b80bb7c47ae1f6ec6ec82709b2966
-
SHA1
09e77c24dc527fe22c9b99d4e011e21c11a654e6
-
SHA256
a15f056478d60a76f088b9a313b5e9b89821a071bddb0be8f174c01de5433986
-
SHA512
38029b12eb99c059f0598e519930a698f3c09de779c63d58ee7d305acda63c031a20358c806d21f578151d26f9aa07a2fefa9ef3624dcb62f5a2047efeafa1fe
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3496 wrote to memory of 2272 3496 rundll32.exe 82 PID 3496 wrote to memory of 2272 3496 rundll32.exe 82 PID 3496 wrote to memory of 2272 3496 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b0b80bb7c47ae1f6ec6ec82709b2966_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b0b80bb7c47ae1f6ec6ec82709b2966_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2272
-