Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-10-2024 12:38
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
181c4c067af43a12520597e634032812_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
181c4c067af43a12520597e634032812_JaffaCakes118.dll
Resource
win10v2004-20240802-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
181c4c067af43a12520597e634032812_JaffaCakes118.dll
-
Size
3KB
-
MD5
181c4c067af43a12520597e634032812
-
SHA1
b4b1d1362eae867ee972d41660f515619c4a73b5
-
SHA256
e4da3a91d0f52e139a99a6589769e86cf2abde8582986f9e4c921990375215a3
-
SHA512
a5ff751629f92b8e15b3823cb0d2d9b1037e44e0a848ed944681e9ca3ab2f5c9f71d021b3cec694549e3d935078e7c432c63a6bb824c69ed4a34cc18a770a6e2
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1352 wrote to memory of 2336 1352 rundll32.exe 82 PID 1352 wrote to memory of 2336 1352 rundll32.exe 82 PID 1352 wrote to memory of 2336 1352 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\181c4c067af43a12520597e634032812_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\181c4c067af43a12520597e634032812_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2336
-