Analysis
-
max time kernel
94s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
263eb8100fdcf2ab812fae0f50c3ff2f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
263eb8100fdcf2ab812fae0f50c3ff2f_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
263eb8100fdcf2ab812fae0f50c3ff2f_JaffaCakes118.dll
-
Size
517KB
-
MD5
263eb8100fdcf2ab812fae0f50c3ff2f
-
SHA1
c4dd04bb1ec024a34ff626f092d1b48184619b1f
-
SHA256
b0c03be4dc29835f1296df1728b61d5ca90b3a35770ec69f419e472eb2c0a550
-
SHA512
23bdafd1a0516141dc664f7114247c832ed29fe3eeaf19e77c449c6b8114875d5147fba1c9b7f19825423844dbf90a694e9913f851311d1c78ca59a52f57008d
-
SSDEEP
12288:PpMJopihlHplnILisuLAS7Q7ntwYEzXz5S2qudQb/Gz1TFicgJcI:PyRp9Cpu8Ss7twYEZTFicgeI
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 216 wrote to memory of 3704 216 rundll32.exe 83 PID 216 wrote to memory of 3704 216 rundll32.exe 83 PID 216 wrote to memory of 3704 216 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\263eb8100fdcf2ab812fae0f50c3ff2f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\263eb8100fdcf2ab812fae0f50c3ff2f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3704
-