Analysis
-
max time kernel
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
41c37e0067b7fce330bc9a154994b989_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
41c37e0067b7fce330bc9a154994b989_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
41c37e0067b7fce330bc9a154994b989_JaffaCakes118.dll
-
Size
13KB
-
MD5
41c37e0067b7fce330bc9a154994b989
-
SHA1
12a9f6ebf05a23188fbf2d98e220bfdf6d5da971
-
SHA256
a8d32e847ec5b24fdb437c7522ce66f9f7e5dd80e6b4096c420b6ede7d3fe697
-
SHA512
8faad21efd6f769ae157a22d669aaaf1f0cf008e21f72560b232fdb950de6191b8192044726c159bde84b9327f77ff9247c9eb12a6c23edeec4c416823471106
-
SSDEEP
192:H2JbJipqtb9SOD41pHMHLyquXuGxq/ouS0KcqWRUDnaciy:WNJftb9SOc1NMrydhqQ+5PGDnz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1316 2396 rundll32.exe 82 PID 2396 wrote to memory of 1316 2396 rundll32.exe 82 PID 2396 wrote to memory of 1316 2396 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41c37e0067b7fce330bc9a154994b989_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\41c37e0067b7fce330bc9a154994b989_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1316
-