Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 21:12
Static task
static1
Behavioral task
behavioral1
Sample
25861ce03344b21999620f4564aa3552_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25861ce03344b21999620f4564aa3552_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
25861ce03344b21999620f4564aa3552_JaffaCakes118.dll
-
Size
316KB
-
MD5
25861ce03344b21999620f4564aa3552
-
SHA1
581a74de450964aa6320db6847d30ff29736d049
-
SHA256
6f4d96a26af26c7bc3a233a78f78de7771fff77ae7602e0d0e53891992aee64a
-
SHA512
39dec6d1b87f5c23d3d11f54d7a3bab3d32d59ada15c7c753122ac02ed70a9970dda9dc6ae47b42fb43754a1b9199760cddf062de3aa6b8b440aca2aba378493
-
SSDEEP
6144:8MdN7Ekxhzd38EEbF++qXp0gMB5Fas/DVh3rNci:8MT7Ekx/NeFO0g2kMDnO
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4144 wrote to memory of 1168 4144 rundll32.exe 85 PID 4144 wrote to memory of 1168 4144 rundll32.exe 85 PID 4144 wrote to memory of 1168 4144 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25861ce03344b21999620f4564aa3552_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25861ce03344b21999620f4564aa3552_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1168
-