Analysis
-
max time kernel
146s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 14:28
Static task
static1
Behavioral task
behavioral1
Sample
bc1d84b6f0eb1099db59bfb470fa2948_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc1d84b6f0eb1099db59bfb470fa2948_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bc1d84b6f0eb1099db59bfb470fa2948_JaffaCakes118.dll
-
Size
25KB
-
MD5
bc1d84b6f0eb1099db59bfb470fa2948
-
SHA1
5bdbb78753dc39a9ff54455f588ddd4f9b5a50a4
-
SHA256
3b4e000c8c772767f0c9a5577708b45171d529f79ca4011df8c0bf0d6486a99e
-
SHA512
68a5125c01ed2a93f2409210cc7868533057811f853269aaa8a0f5312f8af4041706edba7e48b00c56d659c33a7d936d6cd37d4fd9b0b346c715a7360f231b40
-
SSDEEP
384:YuVxz0C5Irqd+16pQiGNKA7TOtAx4pZWn3OMiRG+B3MfWBa/UvC:YBC5aqdSKQTNKcTOW2pZWoG+B3K/L
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3708 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2012 wrote to memory of 3708 2012 rundll32.exe 91 PID 2012 wrote to memory of 3708 2012 rundll32.exe 91 PID 2012 wrote to memory of 3708 2012 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc1d84b6f0eb1099db59bfb470fa2948_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc1d84b6f0eb1099db59bfb470fa2948_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4252,i,2727319350781907497,7925939240893079607,262144 --variations-seed-version --mojo-platform-channel-handle=3952 /prefetch:81⤵PID:1776