Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 08:35
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
3ed7a7bc95e90567f550e0e55d49620e_JaffaCakes118.dll
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
3ed7a7bc95e90567f550e0e55d49620e_JaffaCakes118.dll
Resource
win10v2004-20241007-en
2 signatures
150 seconds
General
-
Target
3ed7a7bc95e90567f550e0e55d49620e_JaffaCakes118.dll
-
Size
3KB
-
MD5
3ed7a7bc95e90567f550e0e55d49620e
-
SHA1
90851e82880cbc7af748a7da2732fc2ea30a7d34
-
SHA256
d3597f2afb1cb21eb01458988b4f29ed2eb22e43d3307137b4f3264f1c6ccfd5
-
SHA512
5ddbebc84f6427c70fbcddbf6047bc99982656a4693f16677a465b3338a623576f1b6de5ca6ceb2d97345c6eadb69a9944bb2a3fcd853bb43dec2cc275dc1a66
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3400 wrote to memory of 4688 3400 rundll32.exe 82 PID 3400 wrote to memory of 4688 3400 rundll32.exe 82 PID 3400 wrote to memory of 4688 3400 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ed7a7bc95e90567f550e0e55d49620e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3ed7a7bc95e90567f550e0e55d49620e_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4688
-