Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 12:59
Behavioral task
behavioral1
Sample
182ffcabef3f11d9f174022e6e8a163e_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
182ffcabef3f11d9f174022e6e8a163e_JaffaCakes118.dll
Resource
win10v2004-20240910-en
General
-
Target
182ffcabef3f11d9f174022e6e8a163e_JaffaCakes118.dll
-
Size
440KB
-
MD5
182ffcabef3f11d9f174022e6e8a163e
-
SHA1
7eec0ee47449fe05446ade2c675671d41cca3b91
-
SHA256
7abd03e04b8ae008c4346a41db40bfe0acbc8b0c570d56a27b9676d60dd17fb1
-
SHA512
e4088bf83490b3ad1e7fc89759a158ad3bfdcb17578511ab1b31d7b883411675efcc9ec66fd4796bd91e1364a7838df866844d8a985ae04ae7ba53091906089a
-
SSDEEP
12288:caJjx4yZA/7gj/qyzSZLJ23SNVQp7KVtNlPBe1:XIZG5SZLeSNVieRBS
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1876 wrote to memory of 3284 1876 rundll32.exe 84 PID 1876 wrote to memory of 3284 1876 rundll32.exe 84 PID 1876 wrote to memory of 3284 1876 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\182ffcabef3f11d9f174022e6e8a163e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\182ffcabef3f11d9f174022e6e8a163e_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3284
-