Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 12:29
Static task
static1
Behavioral task
behavioral1
Sample
3a04357b04599fa2b97d9e6c8b0c88a2_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3a04357b04599fa2b97d9e6c8b0c88a2_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3a04357b04599fa2b97d9e6c8b0c88a2_JaffaCakes118.dll
-
Size
251KB
-
MD5
3a04357b04599fa2b97d9e6c8b0c88a2
-
SHA1
8f9c76fc33edd929836d43662599f8ea24509e9b
-
SHA256
d489137568c07290d1bdfd3f262f885b31d9f86ce0aa897aadf5eba210cf9827
-
SHA512
fb6548f12170c83eb9ecc12b0b4521c78b32107ca7a9446b6decc45caa55229eac1d403cfdc978f59c0ee84de1a5c1233ab9732b88eb453c9ee5e2e9068af230
-
SSDEEP
3072:kXol+h+P2+fTDqAtEO0kajhmEOh0I2eQZZuQrwRwLUYn5CzJTKKcPcB6Hjfmnjiz:kXo3qGEHthvZ9Ld0dKjP76mv
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2316 1920 rundll32.exe 31 PID 1920 wrote to memory of 2316 1920 rundll32.exe 31 PID 1920 wrote to memory of 2316 1920 rundll32.exe 31 PID 1920 wrote to memory of 2316 1920 rundll32.exe 31 PID 1920 wrote to memory of 2316 1920 rundll32.exe 31 PID 1920 wrote to memory of 2316 1920 rundll32.exe 31 PID 1920 wrote to memory of 2316 1920 rundll32.exe 31 PID 2316 wrote to memory of 2064 2316 rundll32.exe 32 PID 2316 wrote to memory of 2064 2316 rundll32.exe 32 PID 2316 wrote to memory of 2064 2316 rundll32.exe 32 PID 2316 wrote to memory of 2064 2316 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a04357b04599fa2b97d9e6c8b0c88a2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a04357b04599fa2b97d9e6c8b0c88a2_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:2064
-
-