Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
1303a2e060c2f6a082bacf8a27731ab8_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1303a2e060c2f6a082bacf8a27731ab8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
1303a2e060c2f6a082bacf8a27731ab8_JaffaCakes118.dll
-
Size
126KB
-
MD5
1303a2e060c2f6a082bacf8a27731ab8
-
SHA1
13ed101ac4799cb0f9164dd1190e9535d5179f1a
-
SHA256
b6633713dfc7b1dc2994da427c8af1d3cf5921020eae3e8698d65d1b3d00cc16
-
SHA512
96972ab8841283bdd195cc5634885025116db8686dd308e607202f57249fe33b342d15f39041b90095a1abba1aa3be0595eaba0a61aba0794ebd9dce3eceebfe
-
SSDEEP
3072:nXwogDrxQxCzFCTU/mPvUq5Dij8WCyqJHJlykCjr1dspHmFdaspPfA:XwoIxQEiHVG8W+rCjr1mpGFVfA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2524 wrote to memory of 4820 2524 rundll32.exe 82 PID 2524 wrote to memory of 4820 2524 rundll32.exe 82 PID 2524 wrote to memory of 4820 2524 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1303a2e060c2f6a082bacf8a27731ab8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1303a2e060c2f6a082bacf8a27731ab8_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4820
-