Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 01:57
Static task
static1
Behavioral task
behavioral1
Sample
8cdca527dff5b43470c03568368cae13_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8cdca527dff5b43470c03568368cae13_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8cdca527dff5b43470c03568368cae13_JaffaCakes118.dll
-
Size
35KB
-
MD5
8cdca527dff5b43470c03568368cae13
-
SHA1
d484f9a2aa91ae6128d0ae9ed3b62882d2426227
-
SHA256
826ec658ab93e75c2149012413340a21bd6ba9d513945bc74f006011ff16102b
-
SHA512
b56941777c539318a83a610a0ffa5489e1638b6797b6e83ccb97c9695b50828e4fcea65b86dd4b2336b4b35a8be3bc48f5024507635b74b7b96ac9721fd2093a
-
SSDEEP
768:sPfBvZHWGwuT+dnls7QQnXbJgv3/CODbEiRVcwv:UBv7T+B67QCXbJgv6OEiRGa
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2792 wrote to memory of 4632 2792 rundll32.exe 91 PID 2792 wrote to memory of 4632 2792 rundll32.exe 91 PID 2792 wrote to memory of 4632 2792 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8cdca527dff5b43470c03568368cae13_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8cdca527dff5b43470c03568368cae13_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4108,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4060 /prefetch:81⤵PID:3996