Analysis
-
max time kernel
139s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
5683f89dc3e6c7d643d0d3b9a389a624_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5683f89dc3e6c7d643d0d3b9a389a624_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
5683f89dc3e6c7d643d0d3b9a389a624_JaffaCakes118.dll
-
Size
1.4MB
-
MD5
5683f89dc3e6c7d643d0d3b9a389a624
-
SHA1
1810e098c1e6137c3bd254c8772b29722e1a189b
-
SHA256
c564600fc54e9e90304edbe05e1f84c6b3b1b5b893077bdb0b63e45d9f86a1c3
-
SHA512
6cf02e2a50e9f7837664f35b71163cb6f3ba4e265106fa37f00e0fd34c35294a8c5c6c5e58a0ffd1263fbaddf5ee3cab7f04771d94d32d9cd284f0661cb4c98d
-
SSDEEP
24576:V0RlQXmlbPwRa4ypSgfW1fil8KupGavkg3NyYMbbTTYIBAUZLYdT6K7K:VuJlbPl4yROg8KupGaXX8YIBAUZLYdT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3152 wrote to memory of 2528 3152 rundll32.exe 84 PID 3152 wrote to memory of 2528 3152 rundll32.exe 84 PID 3152 wrote to memory of 2528 3152 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5683f89dc3e6c7d643d0d3b9a389a624_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5683f89dc3e6c7d643d0d3b9a389a624_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2528
-