Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
b4f42af8ad3262882238a946b78d5892_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4f42af8ad3262882238a946b78d5892_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
b4f42af8ad3262882238a946b78d5892_JaffaCakes118.dll
-
Size
57KB
-
MD5
b4f42af8ad3262882238a946b78d5892
-
SHA1
8e8c44f7fa7f25ace5513e3579d15084d4ebab8b
-
SHA256
06845c19e103cee742663204caac5ccda81ac557724b05264778d2155d539886
-
SHA512
d07e533e7886b6f2ac06320663d366e034c76da57e785f8b14984d5fc5223c74f8972dd6f0898a9ae637f95f007fa76678a1266a3f7c5bcbe8f949bc5bdf32e8
-
SSDEEP
1536:vNIKDP4YU6EMyDcqiZZZNihyISFIR6/JP+3CT:2qP4YU6ErtGNEKIpCT
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5108 wrote to memory of 852 5108 rundll32.exe 83 PID 5108 wrote to memory of 852 5108 rundll32.exe 83 PID 5108 wrote to memory of 852 5108 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4f42af8ad3262882238a946b78d5892_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b4f42af8ad3262882238a946b78d5892_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:852
-