Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
04/10/2024, 14:02
Static task
static1
Behavioral task
behavioral1
Sample
13a46ec624b07e96a0aaec580b5d7cdf_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
13a46ec624b07e96a0aaec580b5d7cdf_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
13a46ec624b07e96a0aaec580b5d7cdf_JaffaCakes118.dll
-
Size
644KB
-
MD5
13a46ec624b07e96a0aaec580b5d7cdf
-
SHA1
0266a3f40c9f6985d711f5de0f18856111f99ebf
-
SHA256
be29ff8c27d77d50cb5a7e0787884d4fd2eac1e7b2cf4eb160db0a8a91c29396
-
SHA512
c8515fd154000b8fb7cd1b1f601429feab43a6a3bcd3ddcab938f789cbfda8b0e27db656b9cbd7cb1a8b2837812f872ed899b8ebb0e3bf421a224cfe8af50ba5
-
SSDEEP
12288:6mciPvW/YFbx5ZPAMK0LYf59HQegUF+nhYz:6B8v8YFxzPAfJzHQUOhYz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1488 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1488 2548 rundll32.exe 29 PID 2548 wrote to memory of 1488 2548 rundll32.exe 29 PID 2548 wrote to memory of 1488 2548 rundll32.exe 29 PID 2548 wrote to memory of 1488 2548 rundll32.exe 29 PID 2548 wrote to memory of 1488 2548 rundll32.exe 29 PID 2548 wrote to memory of 1488 2548 rundll32.exe 29 PID 2548 wrote to memory of 1488 2548 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\13a46ec624b07e96a0aaec580b5d7cdf_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\13a46ec624b07e96a0aaec580b5d7cdf_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1488
-