Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 11:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
132057bfecf453d55b7b22936edbc12c_JaffaCakes118.dll
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
132057bfecf453d55b7b22936edbc12c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
132057bfecf453d55b7b22936edbc12c_JaffaCakes118.dll
-
Size
3KB
-
MD5
132057bfecf453d55b7b22936edbc12c
-
SHA1
ab3e88ddcc2ae53dc3c4b4be770a3927016a6270
-
SHA256
dadbfa010ab229726c390f014a46f15631ae230324f76f6ddef74140eb3932b9
-
SHA512
a689a06261d9c5548027e55c98d483d8bccd260c49e092154a5cec2428a8fdf61dc703aa4f478990f8ec4e994a678ead6af43e41bbb48daf17b93890a5494294
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1872 wrote to memory of 1496 1872 rundll32.exe 81 PID 1872 wrote to memory of 1496 1872 rundll32.exe 81 PID 1872 wrote to memory of 1496 1872 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\132057bfecf453d55b7b22936edbc12c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\132057bfecf453d55b7b22936edbc12c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1496
-