Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 22:07
Static task
static1
Behavioral task
behavioral1
Sample
10aeb933314ee907bc23dd3b5d2e3400_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
10aeb933314ee907bc23dd3b5d2e3400_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
10aeb933314ee907bc23dd3b5d2e3400_JaffaCakes118.dll
-
Size
5KB
-
MD5
10aeb933314ee907bc23dd3b5d2e3400
-
SHA1
93b754f5245b84996de894b81e6b1ce111591102
-
SHA256
4e08311343e3834f576750f91f11941c735fdcb080597ceccd14cfc7ba3ccc50
-
SHA512
d2099a32d46655c1e18a7e01023fe725214ec98c02bf50f6bb865c47221bd60f4a6b3e1bf89703bb4093baf791eea6387a8383a4ead2e50bc32ef110e4a5e71a
-
SSDEEP
96:XprYDpKnI6wJ+Ls7guyHejyn/I9l0iaic:XUcA+ggd+W/If0i+
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1784 wrote to memory of 3060 1784 rundll32.exe 82 PID 1784 wrote to memory of 3060 1784 rundll32.exe 82 PID 1784 wrote to memory of 3060 1784 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10aeb933314ee907bc23dd3b5d2e3400_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10aeb933314ee907bc23dd3b5d2e3400_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3060
-