Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 04:23
Static task
static1
Behavioral task
behavioral1
Sample
0de77104088674dacd40a7d937b7314a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0de77104088674dacd40a7d937b7314a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0de77104088674dacd40a7d937b7314a_JaffaCakes118.dll
-
Size
10KB
-
MD5
0de77104088674dacd40a7d937b7314a
-
SHA1
310388c6b4eb73f92a230c0cbc1577c7a4312d37
-
SHA256
dbbc92792c8821565709854fd125e088e14f055308c8f9a106fed999988ba31a
-
SHA512
456e3774fe0ac22b10ba20b4b53632a0c323c8dd50ed6a265c0edcff2ff9903397102e516db5f2d8a1eb75c5374d2de5170f8d1e5bed5553433117571c2e4a15
-
SSDEEP
192:0CQgXr9rEknRMM0AwFv6aXLUf2c3V2KQVBJXAykgUw9X:aMhEknhgFvUf2uI5VXQ9s
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4912 wrote to memory of 5068 4912 rundll32.exe 82 PID 4912 wrote to memory of 5068 4912 rundll32.exe 82 PID 4912 wrote to memory of 5068 4912 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0de77104088674dacd40a7d937b7314a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0de77104088674dacd40a7d937b7314a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5068
-