Analysis
-
max time kernel
135s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 07:16
Behavioral task
behavioral1
Sample
6daa0410fec3ce3ab8b6ab82f5d96edf_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
6daa0410fec3ce3ab8b6ab82f5d96edf_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
6daa0410fec3ce3ab8b6ab82f5d96edf_JaffaCakes118.dll
-
Size
93KB
-
MD5
6daa0410fec3ce3ab8b6ab82f5d96edf
-
SHA1
ab9a328e775eeba416c24005d103dc7f2056a428
-
SHA256
118a926ae9e2a262a2be16b6d695b8d39183b21beb13e4f23bac5adccd3b9c5e
-
SHA512
3571f6dde95cdf5de352aa03a222274eb29912f73c9303d9d6c12762e990bd93eec2e9584583504175df3d3ae05ee21cf011c89b44561f1f33d1350d76d9ced9
-
SSDEEP
1536:oMJmWKNEo2mN86MowNdcsL8iNVbGtU+EjcuahfgoeCJ5mQp8xr5ya300oayRq55n:oMJmWKNgAJwrzoGctUL12goLqBGa3Toy
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 228 wrote to memory of 1964 228 rundll32.exe rundll32.exe PID 228 wrote to memory of 1964 228 rundll32.exe rundll32.exe PID 228 wrote to memory of 1964 228 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6daa0410fec3ce3ab8b6ab82f5d96edf_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6daa0410fec3ce3ab8b6ab82f5d96edf_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1964