Analysis
-
max time kernel
142s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
86469a1b608fb85c896196984a521318_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
86469a1b608fb85c896196984a521318_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
86469a1b608fb85c896196984a521318_JaffaCakes118.dll
-
Size
116KB
-
MD5
86469a1b608fb85c896196984a521318
-
SHA1
9727332f33fbeac7ff0f1d3451b0022397dd8d47
-
SHA256
92660b0c3ff8647a214c62c0abfeebe1d1ac7ff873b42239e9178db6f74efdff
-
SHA512
489666e323636cd30277477cbc31eb8693f225d94a7a6e86fdf51c22123066215727aeec0d684f0db87f707af0fa5108b78a2eaa47856caa7e3328322e1ec058
-
SSDEEP
1536:/cFEJirVaPM3TxzVbAB7JAYFfsihjWB4dP+gY8X6dmof74:/cFEEVh3TxRw7uUfsiRw4d2n8wL4
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3372 wrote to memory of 1944 3372 rundll32.exe 93 PID 3372 wrote to memory of 1944 3372 rundll32.exe 93 PID 3372 wrote to memory of 1944 3372 rundll32.exe 93
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\86469a1b608fb85c896196984a521318_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\86469a1b608fb85c896196984a521318_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4404,i,10597648459838880772,16562651767759956329,262144 --variations-seed-version --mojo-platform-channel-handle=4400 /prefetch:81⤵PID:448