Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
2589d391b6f47bc0cd02be8ae4d7105e_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2589d391b6f47bc0cd02be8ae4d7105e_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
2589d391b6f47bc0cd02be8ae4d7105e_JaffaCakes118.dll
-
Size
224KB
-
MD5
2589d391b6f47bc0cd02be8ae4d7105e
-
SHA1
7e33c679b4fb8d3f9d1f5beffd244dd3c07b9496
-
SHA256
6641e641a1ed26c6d1a7956f069ac45d2982883b62245e2586464e5fd3854ff9
-
SHA512
25b62f5833ba560f28b12fcda8b5d49d37b843cfaa725440fbc072c0593eb9f6c92b3aaa363a26f0a3d3792f649897f5ef413c7c43c3c9fff3f0997de1efd8d7
-
SSDEEP
3072:2j7oOigc41PaIC2H85JHk5jShoo9aZUC0Ip5Fu4+nN2aKKFQRC08lX34zhs6a:iBVFXH85JHk5jAAkhnN2eMHy3ihs3
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4336 wrote to memory of 3312 4336 rundll32.exe 83 PID 4336 wrote to memory of 3312 4336 rundll32.exe 83 PID 4336 wrote to memory of 3312 4336 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2589d391b6f47bc0cd02be8ae4d7105e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2589d391b6f47bc0cd02be8ae4d7105e_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3312
-