Analysis
-
max time kernel
125s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 16:20
Static task
static1
Behavioral task
behavioral1
Sample
8b123148671319b5417171259302759b_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8b123148671319b5417171259302759b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8b123148671319b5417171259302759b_JaffaCakes118.dll
-
Size
33KB
-
MD5
8b123148671319b5417171259302759b
-
SHA1
2e23ce41b4d81b4b846c1983035e4dc45bc77ed3
-
SHA256
65f057ca8e75839fe18fad3a1bd69115f11e6a186557f798062b2fbd4516e1b8
-
SHA512
709f457c298acc92b23d7583aeacc3c63b59b8731850bd78df377bca745d340a6d63b4f9de554131319ee5b41cbba7daf1c81b5c922b2052d27a69ee09245c19
-
SSDEEP
768:GFC39bq5oxE2AdR40kYO2lg7EW1DdgI5hqDMTR5b+X:GFwgAEw0kY87EWddgWk+Rd+X
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2456 wrote to memory of 792 2456 rundll32.exe 89 PID 2456 wrote to memory of 792 2456 rundll32.exe 89 PID 2456 wrote to memory of 792 2456 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b123148671319b5417171259302759b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b123148671319b5417171259302759b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1020,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=4080 /prefetch:81⤵PID:1980