Analysis
-
max time kernel
136s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 15:02
Behavioral task
behavioral1
Sample
4879dad30b21806bb7546278cae6d799_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4879dad30b21806bb7546278cae6d799_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
4879dad30b21806bb7546278cae6d799_JaffaCakes118.dll
-
Size
1.4MB
-
MD5
4879dad30b21806bb7546278cae6d799
-
SHA1
c24a90d88e64ce3da49fb3690ec167609f365d87
-
SHA256
3b2b650b3d1087dd63088b05dc203cb6eff6809c75b1902055cd739259f01d8c
-
SHA512
0d6308780416b088f6b39817ed4c54b3f1b73dc1588be73f2929a5db6be416c09556a951ce8552b00a9dd86c0f783ebe9a986026b7885ca11a89ccce2c8ea317
-
SSDEEP
24576:s0xQjCmhSweUW6+lfW/pd3WVlsW+XVTWp:bchRjmVlwVT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2176 wrote to memory of 116 2176 rundll32.exe 86 PID 2176 wrote to memory of 116 2176 rundll32.exe 86 PID 2176 wrote to memory of 116 2176 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4879dad30b21806bb7546278cae6d799_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4879dad30b21806bb7546278cae6d799_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:116
-