Analysis
-
max time kernel
140s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-08-2024 03:38
Static task
static1
Behavioral task
behavioral1
Sample
8d296f158ebfef8dd3fd453c536d519f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8d296f158ebfef8dd3fd453c536d519f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8d296f158ebfef8dd3fd453c536d519f_JaffaCakes118.dll
-
Size
340KB
-
MD5
8d296f158ebfef8dd3fd453c536d519f
-
SHA1
a2034c8cab7d83bf2c0246957b97f5efa939f0b5
-
SHA256
7c606c1245c7728ce208f3698d77babe0611fd342cb99a875e46c4fb6def610f
-
SHA512
0a2f685e4a110d332a1796ed9d0889c0eacc08bdfc9921b304fe6a641666fe4d17584f18f15a278be6cdfa672394d31d3de9bf31039b631ed100c6cd908873e3
-
SSDEEP
3072:svA1p08RqEQAIVEd2gG/vNlo0JFx/pANyCm0PQEKR/JnXHWP:s206xWgGxLxWN40PDKR/JnX2P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3064 wrote to memory of 3468 3064 rundll32.exe 91 PID 3064 wrote to memory of 3468 3064 rundll32.exe 91 PID 3064 wrote to memory of 3468 3064 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d296f158ebfef8dd3fd453c536d519f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8d296f158ebfef8dd3fd453c536d519f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4180,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=2184 /prefetch:81⤵PID:2412