Analysis
-
max time kernel
11s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
279bbb758fb71340ae2e0a6a7972ecb0_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
279bbb758fb71340ae2e0a6a7972ecb0_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
279bbb758fb71340ae2e0a6a7972ecb0_JaffaCakes118.dll
-
Size
28KB
-
MD5
279bbb758fb71340ae2e0a6a7972ecb0
-
SHA1
f8a4afc6dcf224caa223681ca9986006eaad8266
-
SHA256
1acbae41f5a9b948e9eb3fa72369f15e1e84d6be802c202bab451c4ea52918f9
-
SHA512
9a77a234a8800f20e344b1ca1dfb711b12d76ff9d9d85009de8119f6032a133b78bbea66a44b4dbb0ea22697303c0583dc3dc29e5909c2760ddeb7aaf3734bd1
-
SSDEEP
768:WyPyn+DNT1viF/zlQDs2eq40syvJADI6+:WyDXq0sJqxA8B
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2624 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2624 2276 rundll32.exe 29 PID 2276 wrote to memory of 2624 2276 rundll32.exe 29 PID 2276 wrote to memory of 2624 2276 rundll32.exe 29 PID 2276 wrote to memory of 2624 2276 rundll32.exe 29 PID 2276 wrote to memory of 2624 2276 rundll32.exe 29 PID 2276 wrote to memory of 2624 2276 rundll32.exe 29 PID 2276 wrote to memory of 2624 2276 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\279bbb758fb71340ae2e0a6a7972ecb0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\279bbb758fb71340ae2e0a6a7972ecb0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2624
-