Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13/10/2024, 17:05
Behavioral task
behavioral1
Sample
410d9be2e9615b701433b56baf39f53b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
410d9be2e9615b701433b56baf39f53b_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
410d9be2e9615b701433b56baf39f53b_JaffaCakes118.dll
-
Size
22KB
-
MD5
410d9be2e9615b701433b56baf39f53b
-
SHA1
d047aeb76ca5a3abd9dda4820d745ff432fda908
-
SHA256
7a1aea56efb129a6ea64e20bb0ef33a6488f522756e6aa6db5bb8b2d6d0cbca7
-
SHA512
f4bdcd8942b3509ea96de7eed6b067167d8de0c79e9f47a378145b5e866cc460ab1cef443f188e19ef759f362f28c5235ba80baac80c37c9b6c5f7dd8f21188c
-
SSDEEP
384:NeH+tWzlSDrb5+gIS3a2Oaa2pbNGJ38pPJv1TCAxAr6+S9Pfu7n58:ntWurb6SOalwYxv1TlxndeV8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wscript.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1804 1836 rundll32.exe 30 PID 1836 wrote to memory of 1804 1836 rundll32.exe 30 PID 1836 wrote to memory of 1804 1836 rundll32.exe 30 PID 1836 wrote to memory of 1804 1836 rundll32.exe 30 PID 1836 wrote to memory of 1804 1836 rundll32.exe 30 PID 1836 wrote to memory of 1804 1836 rundll32.exe 30 PID 1836 wrote to memory of 1804 1836 rundll32.exe 30 PID 1804 wrote to memory of 2904 1804 rundll32.exe 31 PID 1804 wrote to memory of 2904 1804 rundll32.exe 31 PID 1804 wrote to memory of 2904 1804 rundll32.exe 31 PID 1804 wrote to memory of 2904 1804 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\410d9be2e9615b701433b56baf39f53b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\410d9be2e9615b701433b56baf39f53b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\Wscript.exeWscript.exe c:\windows\ime\vbs\pp.vbs3⤵
- System Location Discovery: System Language Discovery
PID:2904
-
-