Analysis
-
max time kernel
140s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 06:46
Behavioral task
behavioral1
Sample
a5c7a696128824769ccf79873198229f_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
3 signatures
150 seconds
General
-
Target
a5c7a696128824769ccf79873198229f_JaffaCakes118.dll
-
Size
95KB
-
MD5
a5c7a696128824769ccf79873198229f
-
SHA1
385cddc955d11cab472e8587961c646ca4241de5
-
SHA256
93914b203372c146f285105b67a4ba54c832e0a719c245e09a3e19b4728b227f
-
SHA512
1015196bc8b3f404fc962a92dfcef1438b91b2e7c54692e257ad46eeb252f9f36fcdaf2e5f66cdcdc8b0be62646c9bf93130eb0cb74da31553bee5dda7dcb96d
-
SSDEEP
1536:SAVJ0mWeB/iU9SZiC99fHgRVaddiwV0qn/jHxXSgQaKNaXwpNusUrGF5:zJ0mW8/ivDTaVsdHqCjR+aIaoR5
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1800-0-0x0000000010000000-0x000000001000C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4816 wrote to memory of 1800 4816 rundll32.exe 91 PID 4816 wrote to memory of 1800 4816 rundll32.exe 91 PID 4816 wrote to memory of 1800 4816 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5c7a696128824769ccf79873198229f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a5c7a696128824769ccf79873198229f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4152,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4316 /prefetch:81⤵PID:1676