Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 09:18
Behavioral task
behavioral1
Sample
3949d218db199a8bd82fbeaee3762ad7_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3949d218db199a8bd82fbeaee3762ad7_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3949d218db199a8bd82fbeaee3762ad7_JaffaCakes118.dll
-
Size
487KB
-
MD5
3949d218db199a8bd82fbeaee3762ad7
-
SHA1
c4c024b0a5a2d2edfb333c81fb445e175062af0b
-
SHA256
9e9051f09d8707dc29a4ce21baf0557786014a5d55e06fb7bb4d7d279b806ba0
-
SHA512
2609b5ba8d229093df83a2989ce151d0a11e11bf565a42bf2c11b3892cece79e634744fd5d0db802343f105fa12badf870183bf8d58b093993eac962d748e62e
-
SSDEEP
12288:TAM2TsG4rJubRJMoi+duZG3laeJ7TyWKqC1bBv6AoSC:dw4ryRGhhql57TyWKNbC
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4320 wrote to memory of 1084 4320 rundll32.exe 85 PID 4320 wrote to memory of 1084 4320 rundll32.exe 85 PID 4320 wrote to memory of 1084 4320 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3949d218db199a8bd82fbeaee3762ad7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3949d218db199a8bd82fbeaee3762ad7_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1084
-