Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 22:20
Static task
static1
Behavioral task
behavioral1
Sample
3c523322f7ef8813e9b982f777e3a43d_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3c523322f7ef8813e9b982f777e3a43d_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3c523322f7ef8813e9b982f777e3a43d_JaffaCakes118.dll
-
Size
56KB
-
MD5
3c523322f7ef8813e9b982f777e3a43d
-
SHA1
e1c61fa246a41dc8a8edf0fd0d67f6b628ed265f
-
SHA256
1dbf9fd685d95cce1a774f08e5f2223febb3b8db40349d38e669b7e59774fb55
-
SHA512
e1bbab56fe4a04db6312a71111fdee8c754dce825d278226212c748057f91b5dd7ea25f36b9737195e8c2c2e75e1974b08c93929bf6883d5b2d9939b1ec49ed7
-
SSDEEP
768:IgNeB5yK+aL3Bypkw80Y3hT21SUVVtqSQ4AGt/iB94sidP40zwKFJk5TsQPdowc:IgcB4K3R0ahTKNVVtqS8GtRrWsiowc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2012 wrote to memory of 3068 2012 rundll32.exe 83 PID 2012 wrote to memory of 3068 2012 rundll32.exe 83 PID 2012 wrote to memory of 3068 2012 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c523322f7ef8813e9b982f777e3a43d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c523322f7ef8813e9b982f777e3a43d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3068
-