Analysis
-
max time kernel
146s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 08:49
Behavioral task
behavioral1
Sample
89bc3703ed19ab29f8d275a35a15fe67_JaffaCakes118.dll
Resource
win7-20240705-en
2 signatures
150 seconds
General
-
Target
89bc3703ed19ab29f8d275a35a15fe67_JaffaCakes118.dll
-
Size
74KB
-
MD5
89bc3703ed19ab29f8d275a35a15fe67
-
SHA1
0f1b7aed49a7102ea30bd65dba6e5760c0bc1f5f
-
SHA256
1c8768c63f711e32b269a97fa278875fb24947193e542231cf617f9288d434d3
-
SHA512
be0cde63edc2ee696f2183f3c7cd749acac766ecb2704a77df5f0d28de1998a3120f71cc36dda03f1800db23eb73c84b87540d5ecd31b73b68aec0370dc69a3f
-
SSDEEP
1536:lTD+K/8sPdAuUAJ0/9FO8Zd/Y6Q85tvEAjS1P19ouROo0RKzpdO:l/tksP3URlFO8b/ZvEAjS1P19Rs3RK+
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2368-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2368 2380 rundll32.exe 91 PID 2380 wrote to memory of 2368 2380 rundll32.exe 91 PID 2380 wrote to memory of 2368 2380 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89bc3703ed19ab29f8d275a35a15fe67_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\89bc3703ed19ab29f8d275a35a15fe67_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4336,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=4324 /prefetch:81⤵PID:388