Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 18:04
Static task
static1
Behavioral task
behavioral1
Sample
52fb67bf07618a67be3e71e661ffb37a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
52fb67bf07618a67be3e71e661ffb37a_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
52fb67bf07618a67be3e71e661ffb37a_JaffaCakes118.dll
-
Size
50KB
-
MD5
52fb67bf07618a67be3e71e661ffb37a
-
SHA1
2d8a56256aeb51dfc51fbe1d2760916689d1d5f5
-
SHA256
a5564a62b735013b7000481ec334399fe50b3885eadb841a2ad9f0754b93a967
-
SHA512
ac896407aace041082f9610c4ae56955d9ebd531772acf90163eb075b6367efa10dd06e0e377d78329227acf6dcc95c9388a8ac3708e233d6f9373d6df60d170
-
SSDEEP
768:eikuw0NTjyaxa9QvTNHmb3W1YAkPMVCl7TbswxDNzk5VWzQzXq9fGAAVJ0N1nv:er0NTjyaXbRm77NpofTqxGAAVJ0N1v
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1952 wrote to memory of 4868 1952 rundll32.exe 84 PID 1952 wrote to memory of 4868 1952 rundll32.exe 84 PID 1952 wrote to memory of 4868 1952 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\52fb67bf07618a67be3e71e661ffb37a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\52fb67bf07618a67be3e71e661ffb37a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4868
-