Analysis
-
max time kernel
92s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 00:04
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0d03f863cf88ff61f29276b6b9f63b40_JaffaCakes118.dll
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
0d03f863cf88ff61f29276b6b9f63b40_JaffaCakes118.dll
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
0d03f863cf88ff61f29276b6b9f63b40_JaffaCakes118.dll
-
Size
3KB
-
MD5
0d03f863cf88ff61f29276b6b9f63b40
-
SHA1
53ff0da3c538c28f22a891a84831a89373d3d8b4
-
SHA256
aacc6f7bcb076457ad1a6554fca2d30da6be92ee1fa08694bb488a0b48e414a8
-
SHA512
75ea351f196f2c54851df159ae87321de2cd39b0a134a0ea923a0f7e47140a79093fcc035f1600e949af37de9c54c64c502032f090b86d2ecfb0401844386a5b
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1572 wrote to memory of 1212 1572 rundll32.exe 82 PID 1572 wrote to memory of 1212 1572 rundll32.exe 82 PID 1572 wrote to memory of 1212 1572 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d03f863cf88ff61f29276b6b9f63b40_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0d03f863cf88ff61f29276b6b9f63b40_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1212
-