Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 17:05
Behavioral task
behavioral1
Sample
410d9be2e9615b701433b56baf39f53b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
410d9be2e9615b701433b56baf39f53b_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
410d9be2e9615b701433b56baf39f53b_JaffaCakes118.dll
-
Size
22KB
-
MD5
410d9be2e9615b701433b56baf39f53b
-
SHA1
d047aeb76ca5a3abd9dda4820d745ff432fda908
-
SHA256
7a1aea56efb129a6ea64e20bb0ef33a6488f522756e6aa6db5bb8b2d6d0cbca7
-
SHA512
f4bdcd8942b3509ea96de7eed6b067167d8de0c79e9f47a378145b5e866cc460ab1cef443f188e19ef759f362f28c5235ba80baac80c37c9b6c5f7dd8f21188c
-
SSDEEP
384:NeH+tWzlSDrb5+gIS3a2Oaa2pbNGJ38pPJv1TCAxAr6+S9Pfu7n58:ntWurb6SOalwYxv1TlxndeV8
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Wscript.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4944 wrote to memory of 916 4944 rundll32.exe 83 PID 4944 wrote to memory of 916 4944 rundll32.exe 83 PID 4944 wrote to memory of 916 4944 rundll32.exe 83 PID 916 wrote to memory of 2340 916 rundll32.exe 86 PID 916 wrote to memory of 2340 916 rundll32.exe 86 PID 916 wrote to memory of 2340 916 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\410d9be2e9615b701433b56baf39f53b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\410d9be2e9615b701433b56baf39f53b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\Wscript.exeWscript.exe c:\windows\ime\vbs\pp.vbs3⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-