Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 11:23
Behavioral task
behavioral1
Sample
17e1a074fa6f71d1025d9e8e4be0887a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17e1a074fa6f71d1025d9e8e4be0887a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
17e1a074fa6f71d1025d9e8e4be0887a_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
17e1a074fa6f71d1025d9e8e4be0887a
-
SHA1
a041ada96a0d1ee49a59737f82aac3bb7f6f0870
-
SHA256
a1bb96273affae6d4195153f32efd5c116a2b4abbfcb8b07c6368638f53eac56
-
SHA512
74462c3cbc2cab4c36d5118fa675c6b28db89b7369c12da5f58a3b67fc740dc25828110b9f06752d8bb77271c17288c8d4d35755c9226118b2a074f33851ba4b
-
SSDEEP
24576:HM1oqL2dpnENrXA0XiumuXwxKyY6NMAlJ35APR7YgGGipagP1fSRuWF8s:HPqiddGrXA0SumGKBL6q0mgH3gP16Rxv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4800 wrote to memory of 1016 4800 rundll32.exe 84 PID 4800 wrote to memory of 1016 4800 rundll32.exe 84 PID 4800 wrote to memory of 1016 4800 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17e1a074fa6f71d1025d9e8e4be0887a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17e1a074fa6f71d1025d9e8e4be0887a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1016
-