Analysis
-
max time kernel
12s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 15:55
Static task
static1
Behavioral task
behavioral1
Sample
3adee534e1634d32226f7f12e0625b7b_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3adee534e1634d32226f7f12e0625b7b_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3adee534e1634d32226f7f12e0625b7b_JaffaCakes118.dll
-
Size
945KB
-
MD5
3adee534e1634d32226f7f12e0625b7b
-
SHA1
3678473ad9ecef2a281524b2911eb1e1cd0a6da9
-
SHA256
eedda998ba9cee82b0289ece49028574ddfea13d77ce4e16c26a089f8cbcce34
-
SHA512
de4f77c5b5c6456fb4aaca82db48c7ba8ae5388772020121101b4b2537e8d26dc1ef38938c938b6295095a86748e1ae6ce5157105ae8160064ffe8b67fc186ee
-
SSDEEP
12288:ANZpFCYNICoOW7SOsDVt1AqOj8wmViPHI6U05NcP/GMeIaQB9:ANjw8A7ZsDVvw8wHIyr6miB9
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2432 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2432 2172 rundll32.exe 29 PID 2172 wrote to memory of 2432 2172 rundll32.exe 29 PID 2172 wrote to memory of 2432 2172 rundll32.exe 29 PID 2172 wrote to memory of 2432 2172 rundll32.exe 29 PID 2172 wrote to memory of 2432 2172 rundll32.exe 29 PID 2172 wrote to memory of 2432 2172 rundll32.exe 29 PID 2172 wrote to memory of 2432 2172 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3adee534e1634d32226f7f12e0625b7b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3adee534e1634d32226f7f12e0625b7b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2432
-