Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 06:07
Static task
static1
Behavioral task
behavioral1
Sample
1225420c7100f3d7f49de3ae10f22238_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1225420c7100f3d7f49de3ae10f22238_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
1225420c7100f3d7f49de3ae10f22238_JaffaCakes118.dll
-
Size
472KB
-
MD5
1225420c7100f3d7f49de3ae10f22238
-
SHA1
ef0fe1c8e11db5c9d915457c81a6fc18869bf93c
-
SHA256
bd53cabae94da58605b809f362fabc3fef385f05be89bef3f1358aff43636ce8
-
SHA512
af9b0f399f6b52e345aae8683d02a1dc507efdd65be7fd1fa2de796c6a74f7cb67d6b24c0d317b6222df0d9b0fc3819d644e2d322fe4ed3538b36e968a454989
-
SSDEEP
6144:RHoFGCXjrneEa7xvU8uihymf1Zso17kcDOxMk0dR+A5GHOvTKIwdPQQY0KEPW3+4:RHo8CXjy7xU8z7soacDtdRZvXrLVAeWE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2372 wrote to memory of 3012 2372 rundll32.exe 30 PID 2372 wrote to memory of 3012 2372 rundll32.exe 30 PID 2372 wrote to memory of 3012 2372 rundll32.exe 30 PID 2372 wrote to memory of 3012 2372 rundll32.exe 30 PID 2372 wrote to memory of 3012 2372 rundll32.exe 30 PID 2372 wrote to memory of 3012 2372 rundll32.exe 30 PID 2372 wrote to memory of 3012 2372 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1225420c7100f3d7f49de3ae10f22238_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1225420c7100f3d7f49de3ae10f22238_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3012
-