Analysis
-
max time kernel
138s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
54c86bc4679bd554ff14fd1b6e132947_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
54c86bc4679bd554ff14fd1b6e132947_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
54c86bc4679bd554ff14fd1b6e132947_JaffaCakes118.dll
-
Size
98KB
-
MD5
54c86bc4679bd554ff14fd1b6e132947
-
SHA1
e44ec5312c467ea59825269e094ff03140b17490
-
SHA256
6b900fc66302d5e4e3dc0aacaa76c07d4de08626973cba74d5be23404bbddf19
-
SHA512
91fd1b1f8343169b30e01f34fd3f4c4c340be81e6963ccf843faecdd78a47b38a72b37ab54805c5c5c613ffca52a6d20941da78bef43fea902c74c98fd1cfbfc
-
SSDEEP
1536:utN86G4cghmIIrO4cuI/WrOCbrJAg4So9GOhr/r0mNlNokN8LEJR79/:Aa69kSKqWrO/RSonNlNt8LEnx/
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3088 wrote to memory of 2920 3088 rundll32.exe 84 PID 3088 wrote to memory of 2920 3088 rundll32.exe 84 PID 3088 wrote to memory of 2920 3088 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54c86bc4679bd554ff14fd1b6e132947_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54c86bc4679bd554ff14fd1b6e132947_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2920
-