Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 12:33
Static task
static1
Behavioral task
behavioral1
Sample
181901b54838554f66f65835bad97e47_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
181901b54838554f66f65835bad97e47_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
181901b54838554f66f65835bad97e47_JaffaCakes118.dll
-
Size
33KB
-
MD5
181901b54838554f66f65835bad97e47
-
SHA1
eae8a5054f6904aed84c36fcc6df584acc3a5cdc
-
SHA256
b52739e1a77a6356d4f18b82c33e69943cd26459284954102490a8c23f79f4fa
-
SHA512
6202827d2fb08c629a356c02da890cb74c3f9d7eff95631793463bce0c2cb93688e6bf2897e79235b7ff5cbe5d6b80a875d7edfc78cc936807b47ca447ad03f1
-
SSDEEP
768:E9qeula2iuu4enYOE7IOIoSYhqD6RBu6J:E9qeulu4eYj7IOI2kGRB7J
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3400 wrote to memory of 5080 3400 rundll32.exe 82 PID 3400 wrote to memory of 5080 3400 rundll32.exe 82 PID 3400 wrote to memory of 5080 3400 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\181901b54838554f66f65835bad97e47_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\181901b54838554f66f65835bad97e47_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5080
-