Analysis
-
max time kernel
139s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 03:00
Static task
static1
Behavioral task
behavioral1
Sample
551dd04349ce7e48f1d9601cdfe24804_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
551dd04349ce7e48f1d9601cdfe24804_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
551dd04349ce7e48f1d9601cdfe24804_JaffaCakes118.dll
-
Size
69KB
-
MD5
551dd04349ce7e48f1d9601cdfe24804
-
SHA1
52c3c59ee4315d50897689b7583c17ea4b097559
-
SHA256
ad2c0b62e8702aec71d2f74e9722832c62bd73a41485d1eb2ddd50a5d08fbd6d
-
SHA512
24746924ffdabc37cd0ced5ba378c457430f568f78f30051b0f81d98e26a508815c79cf25d36f0be4a668e3a801431138d9b598b5f42dd6f334e90a79f1a4f9b
-
SSDEEP
1536:B3Qg3uw4bTKnuA9ZSgjTIyq5lb6d5pm03Uyk5BjRXNqnP:BReTenuqSgj03lmpdJaBjRXkn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1692 wrote to memory of 648 1692 rundll32.exe 84 PID 1692 wrote to memory of 648 1692 rundll32.exe 84 PID 1692 wrote to memory of 648 1692 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\551dd04349ce7e48f1d9601cdfe24804_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\551dd04349ce7e48f1d9601cdfe24804_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:648
-