Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 04:36
Static task
static1
Behavioral task
behavioral1
Sample
2af0811fafce1c90924582493f9b0ddf_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2af0811fafce1c90924582493f9b0ddf_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
2af0811fafce1c90924582493f9b0ddf_JaffaCakes118.dll
-
Size
118KB
-
MD5
2af0811fafce1c90924582493f9b0ddf
-
SHA1
554bbf808fe5f8d259d338f006c43207a194c273
-
SHA256
b0b252d903a319caf500d2093bfaf6abff3d5da7f52b565d37ac5fa57b87ee88
-
SHA512
24ce2e0758153c357fadf1233acb9ea8724dd15f5e562694a88be19d5547fee6360a7288786a04a02913044b565895666d65b8c9160e3fded65926cd157c05d4
-
SSDEEP
3072:rqB9aklH7atjJoVEZTxweCrf7GTim5fULm1bEo7jw1F:rq3akgFoVEZdweuqb58LmlB2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4732 wrote to memory of 916 4732 rundll32.exe 83 PID 4732 wrote to memory of 916 4732 rundll32.exe 83 PID 4732 wrote to memory of 916 4732 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2af0811fafce1c90924582493f9b0ddf_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2af0811fafce1c90924582493f9b0ddf_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:916
-