Analysis
-
max time kernel
135s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 21:46
Behavioral task
behavioral1
Sample
bd45af05d5d0807dd3681ef71e2935e5_JaffaCakes118.dll
Resource
win7-20240704-en
3 signatures
150 seconds
General
-
Target
bd45af05d5d0807dd3681ef71e2935e5_JaffaCakes118.dll
-
Size
76KB
-
MD5
bd45af05d5d0807dd3681ef71e2935e5
-
SHA1
b26a66fd1730d33c94e3220518b272002170f6cf
-
SHA256
ce30dafc5620b4f321704c7a4eec4d4846ce12ae87ee8bbf8d44a997bf59cb34
-
SHA512
c4a2554cedd059d1f72b57aae6144ddc3712a2fe778049bb2a440b75dabd5208a3563cbc2964bb2150810e4b6bfc96923f857d2cca4ec30ab62234fcb3b9e874
-
SSDEEP
1536:n7ZLNPp9pZBMiHaUMsnGKBgwcWxpXV3YPMii0fHbb7UZhO:7ZppZaonGKaw3ZZ0XPDb7Uy
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1892-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4932 wrote to memory of 1892 4932 rundll32.exe 91 PID 4932 wrote to memory of 1892 4932 rundll32.exe 91 PID 4932 wrote to memory of 1892 4932 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd45af05d5d0807dd3681ef71e2935e5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bd45af05d5d0807dd3681ef71e2935e5_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4444,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:81⤵PID:2472