Analysis
-
max time kernel
93s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
0b8fb810671930a1fc485008df2fa80b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b8fb810671930a1fc485008df2fa80b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0b8fb810671930a1fc485008df2fa80b_JaffaCakes118.dll
-
Size
24KB
-
MD5
0b8fb810671930a1fc485008df2fa80b
-
SHA1
46eed8b692475fd4f0d722229615785f93764006
-
SHA256
14db5d71adc0ef7e6c8c1b377408b81c950716cf897b61fb652055c111bb7d6b
-
SHA512
da45b4f6c8e9c3188770a5af8414764122b1d24be33b1ef7345718e3d6edef8e82f110c153fc9c1cf03342a5c636cc0215757bf472df3fe9650e275bc22be36d
-
SSDEEP
384:6jfdNzGLlUeo5dMpHGtA7RGg0tR83GdyVBl2jwtnEFGrqVNsD8uusk7RTESBJgmp:YfDzGhUeodMRkA7RxAR83GSTnEFGry+L
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4184 wrote to memory of 1280 4184 rundll32.exe 82 PID 4184 wrote to memory of 1280 4184 rundll32.exe 82 PID 4184 wrote to memory of 1280 4184 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b8fb810671930a1fc485008df2fa80b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0b8fb810671930a1fc485008df2fa80b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1280
-