Analysis
-
max time kernel
143s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 00:03
Static task
static1
Behavioral task
behavioral1
Sample
8415e0b9646626eefd4decaeea1a727c_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8415e0b9646626eefd4decaeea1a727c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8415e0b9646626eefd4decaeea1a727c_JaffaCakes118.dll
-
Size
7KB
-
MD5
8415e0b9646626eefd4decaeea1a727c
-
SHA1
209afa55b1af10da040d886fbe20672575eb2b80
-
SHA256
e2dad6eec372fa4534b30261b3b32813062810defe2856b57d52b16ce8e88eaa
-
SHA512
565046090df3e92b3ca9b13a146f644758fc71d09280598343ec26dcdcd49274586218e25c7787c20b717c564633340aa022575fee8cd0d941136969234badf6
-
SSDEEP
96:nPwz6BNFZwopyM8GuDofurN7/DLjUuhMeLtv8aTMP345QT3BL5aQt:n46b/TduCSRLjzhUaT84+tI
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/memory/4300-0-0x0000000000400000-0x000000000040A000-memory.dmp acprotect -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4300 1508 rundll32.exe 91 PID 1508 wrote to memory of 4300 1508 rundll32.exe 91 PID 1508 wrote to memory of 4300 1508 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8415e0b9646626eefd4decaeea1a727c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8415e0b9646626eefd4decaeea1a727c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4020,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4108 /prefetch:81⤵PID:3996