Analysis
-
max time kernel
141s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 19:01
Behavioral task
behavioral1
Sample
974b95d8c3dd4e27ddb9a7d6a60be030_JaffaCakes118.dll
Resource
win7-20240705-en
2 signatures
150 seconds
General
-
Target
974b95d8c3dd4e27ddb9a7d6a60be030_JaffaCakes118.dll
-
Size
65KB
-
MD5
974b95d8c3dd4e27ddb9a7d6a60be030
-
SHA1
747d1a3cc4ac3a12778eeaf7f373c441cc4df777
-
SHA256
e74003745379c28726b4bbbb12983f9e11499788a036cb7215b68c9050625bb3
-
SHA512
c485f585c3e7cd23c160ff548ba04cc4e67e4514887fbacfcd865a0086868850d2f3bd1006f5a2372917d9b4a94a0ce5916825bf0ff0059359ef2b421b1652ad
-
SSDEEP
1536:yl3E0TqNAIgzHO9zkY7EZ/kh7CrzBSa/LjRz63JFeBJL5:E39mNYuVN7EIOZP/Lh65Fed
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3772-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1444 wrote to memory of 3772 1444 rundll32.exe 91 PID 1444 wrote to memory of 3772 1444 rundll32.exe 91 PID 1444 wrote to memory of 3772 1444 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\974b95d8c3dd4e27ddb9a7d6a60be030_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\974b95d8c3dd4e27ddb9a7d6a60be030_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4332,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=3884 /prefetch:81⤵PID:692