Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 08:56
Static task
static1
Behavioral task
behavioral1
Sample
56896709d3dd3c74bfdf634d901fd1de_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
56896709d3dd3c74bfdf634d901fd1de_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
56896709d3dd3c74bfdf634d901fd1de_JaffaCakes118.dll
-
Size
272KB
-
MD5
56896709d3dd3c74bfdf634d901fd1de
-
SHA1
5b5fc8136b6c57c78d8fbdf8e06a4baf11b0d1ba
-
SHA256
a20c2cb36d86f62aa3def6005aa9c817d31089f455f241c5f91a779468e578fd
-
SHA512
f9b5ee72edc9723f0c47b715fbea5f2829db69f74d3262bb782bd7fb87bb08a9a3d8a73af7d17607b0753303680477dd0de5c62f0e3859c1a0f44f1c6db3c37b
-
SSDEEP
6144:wtZrZsfK+COHrz4vdCX3aG9FQbZkkXp07lBS5i:wtlTw4vUXbaSRY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2864 wrote to memory of 2256 2864 rundll32.exe 84 PID 2864 wrote to memory of 2256 2864 rundll32.exe 84 PID 2864 wrote to memory of 2256 2864 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56896709d3dd3c74bfdf634d901fd1de_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\56896709d3dd3c74bfdf634d901fd1de_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2256
-