Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
2cf460e0c7af4886322005f7b3bfa8fd_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2cf460e0c7af4886322005f7b3bfa8fd_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
2cf460e0c7af4886322005f7b3bfa8fd_JaffaCakes118.dll
-
Size
106KB
-
MD5
2cf460e0c7af4886322005f7b3bfa8fd
-
SHA1
210b1b4188788b8b1211c56f9a76b8c39ca15bb8
-
SHA256
ca49eab6caa736bb1f5e58e5c3909c837e076a1b02763af28df3ad00251f0e8f
-
SHA512
7e96d443277a681fde52fef1783693dae596fe0e55df4c605ae5916b8db5c1e41e39ac1dc1ed76a19fd416750743deff14f7adb360a8bcef689c074efafaee21
-
SSDEEP
3072:CYrZVZ/TgBdg+VsxUUYJ64kg/AqjAtFVEN:Dh/TgBZVMJYJ6dyktDE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5072 wrote to memory of 3040 5072 rundll32.exe 83 PID 5072 wrote to memory of 3040 5072 rundll32.exe 83 PID 5072 wrote to memory of 3040 5072 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cf460e0c7af4886322005f7b3bfa8fd_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2cf460e0c7af4886322005f7b3bfa8fd_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3040
-