Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 06:27
Static task
static1
Behavioral task
behavioral1
Sample
2c729425d0f5cd40b6213190f44f1d43_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2c729425d0f5cd40b6213190f44f1d43_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
2c729425d0f5cd40b6213190f44f1d43_JaffaCakes118.dll
-
Size
609KB
-
MD5
2c729425d0f5cd40b6213190f44f1d43
-
SHA1
c63f8c1ebf9298f8abfba22b59239b8347bcf875
-
SHA256
c4afe0b35970f1c0d59b7082aa0709ffc111102b22a881df15726991dea4347c
-
SHA512
f127c00179dfb390b532e3a9cdc7ee18f9297cb810ce997f65a36677c5c2a372741374073e8fd2f7d4992480fe94be800a3fb07dec776c044cada6d2936979d0
-
SSDEEP
768:Cu1GPvjhjM0mK5FkgdRnG4QA7ayEi6PAdQqqG:7wjtBhRnG4/PJv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3284 wrote to memory of 4568 3284 rundll32.exe 83 PID 3284 wrote to memory of 4568 3284 rundll32.exe 83 PID 3284 wrote to memory of 4568 3284 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c729425d0f5cd40b6213190f44f1d43_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c729425d0f5cd40b6213190f44f1d43_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4568
-