Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
3a2840057a92da03756fef5a2a5332d1_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3a2840057a92da03756fef5a2a5332d1_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3a2840057a92da03756fef5a2a5332d1_JaffaCakes118.dll
-
Size
176KB
-
MD5
3a2840057a92da03756fef5a2a5332d1
-
SHA1
f3e17a6d37a59c28e3ca0e523169b3585de93601
-
SHA256
6c4e31bec3e577f369608ed5daeaa97a8133e9060175aea0b494d59e32952001
-
SHA512
0fe6727132ca3576207e21a2ec019c3e3860d531484a61e9a1395006e253a3cf6da2a39415e8231fef7d736cd704ddaa918f97e8aaf79707c9660fefff8c2d71
-
SSDEEP
3072:a6sxDBp6YtIjnrhjOxEgRMa+Og64LdmJ8LI4CpG+:avfsjr9w7Wa+A4Bm+LI9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4584 wrote to memory of 872 4584 rundll32.exe 83 PID 4584 wrote to memory of 872 4584 rundll32.exe 83 PID 4584 wrote to memory of 872 4584 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a2840057a92da03756fef5a2a5332d1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3a2840057a92da03756fef5a2a5332d1_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:872
-