Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-08-2024 13:50
Static task
static1
Behavioral task
behavioral1
Sample
9e9dcee9074dee45dcf8628723ad3e7b_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9e9dcee9074dee45dcf8628723ad3e7b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
9e9dcee9074dee45dcf8628723ad3e7b_JaffaCakes118.dll
-
Size
340KB
-
MD5
9e9dcee9074dee45dcf8628723ad3e7b
-
SHA1
be4764c9e1c1db79e70c8ed014556ae34e8df1e1
-
SHA256
4616e4cd679a47415668bbeb3028d11341c7f5655e6c6da0eab102f261991f47
-
SHA512
98655479fef10c56cfbdabb7c0166d8d0b5c120a46c1dc5f27a931bfc8650c49b0b3d794798a47a451d2d1e3f5cef82a8fd2d172df32b02f63b3e41ce04277e8
-
SSDEEP
3072:OvA1p08RqEQAIVEd2gG/vNlo0JFx/pANyCm0PQEKR/JnXRca:O206xWgGxLxWN40PDKR/JnXya
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3732 wrote to memory of 4992 3732 rundll32.exe 93 PID 3732 wrote to memory of 4992 3732 rundll32.exe 93 PID 3732 wrote to memory of 4992 3732 rundll32.exe 93
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9e9dcee9074dee45dcf8628723ad3e7b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9e9dcee9074dee45dcf8628723ad3e7b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3996,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4440 /prefetch:81⤵PID:3240