Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 22:35
Static task
static1
Behavioral task
behavioral1
Sample
267d260505bb20055542a962d28396a1_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
267d260505bb20055542a962d28396a1_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
267d260505bb20055542a962d28396a1_JaffaCakes118.dll
-
Size
336KB
-
MD5
267d260505bb20055542a962d28396a1
-
SHA1
c1567d7f876f42637c71776036e60281b51154ab
-
SHA256
be1d8541f9b937cdd5729b2edcbe7ce73a17b29702c56d1fe10acd5913d64e94
-
SHA512
ff0f6d0369160e7d95563eb859ac6fde15ba1fb4517e78aa5907a650b0dd1fdecc22891272e86e5e0342b9b743a4c1f47b7af3d5163d792e644b028c1edc8177
-
SSDEEP
6144:ZH6JCyVmEyYlxlKoYoox4fzXaw7b4bF/NgOlHudCKusbd:paSYjlKPyfzawuK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4012 wrote to memory of 3312 4012 rundll32.exe 83 PID 4012 wrote to memory of 3312 4012 rundll32.exe 83 PID 4012 wrote to memory of 3312 4012 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\267d260505bb20055542a962d28396a1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\267d260505bb20055542a962d28396a1_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3312
-