Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 23:00
Static task
static1
Behavioral task
behavioral1
Sample
153c34e2f14eadcf95d4b28201f04a20_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
153c34e2f14eadcf95d4b28201f04a20_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
153c34e2f14eadcf95d4b28201f04a20_JaffaCakes118.dll
-
Size
88KB
-
MD5
153c34e2f14eadcf95d4b28201f04a20
-
SHA1
1b4e0399c997a6e38903814d1d030f8bb100910c
-
SHA256
4f36c2d3e5df7120ba1fd09b4079cd05f4576e5f409966b8553f63b14441407b
-
SHA512
cd9926dd287094964fccc3e7f997cf07fe66accc484e454debfd8816331a04a85146cc39286ed3a887b7e8a6437375b7a85e3e327f0d658281a6d7d1bd22a652
-
SSDEEP
1536:p+0oRi1Lhh8+J2I39dT48lCXTx7Qfph2B8S2RSJpOsA:hogzh8y2oT48lo7QhU2SySJpOsA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1928 wrote to memory of 4424 1928 rundll32.exe 82 PID 1928 wrote to memory of 4424 1928 rundll32.exe 82 PID 1928 wrote to memory of 4424 1928 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\153c34e2f14eadcf95d4b28201f04a20_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\153c34e2f14eadcf95d4b28201f04a20_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4424
-