Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
1455013e921ed1ae94e865512b2a1f88_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1455013e921ed1ae94e865512b2a1f88_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
1455013e921ed1ae94e865512b2a1f88_JaffaCakes118.dll
-
Size
56KB
-
MD5
1455013e921ed1ae94e865512b2a1f88
-
SHA1
260e0c182d0746061579d68efba66ec8e6394bbc
-
SHA256
c4c40d673f7dc1b9b5e874bf0aeaf5ab26345036e1f8d5bb2a28e3cdb9ddff1e
-
SHA512
19ebe0b953693720ac5f88b6eb28209d29975d42a1c9b80cef3130bdfdc20581809bd01440de8bb07b9f656aa553a964046df8efab97d8e1e19bb4f143364eef
-
SSDEEP
768:2lPIMx2+aL3Bypkw80Y3hT21SUVVtqSQ4AGt/iB94sidP40zwKFJk5TsQN5kNAcA:MPIu23R0ahTKNVVtqS8GtRrWsBAcA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3876 wrote to memory of 4128 3876 rundll32.exe 82 PID 3876 wrote to memory of 4128 3876 rundll32.exe 82 PID 3876 wrote to memory of 4128 3876 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1455013e921ed1ae94e865512b2a1f88_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1455013e921ed1ae94e865512b2a1f88_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4128
-