Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 15:06
Static task
static1
Behavioral task
behavioral1
Sample
bc3c42f4f444326cbb44ecfa9b759276_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc3c42f4f444326cbb44ecfa9b759276_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bc3c42f4f444326cbb44ecfa9b759276_JaffaCakes118.dll
-
Size
340KB
-
MD5
bc3c42f4f444326cbb44ecfa9b759276
-
SHA1
43086f7b34e21f921ab1222c7dce1789b03e71b6
-
SHA256
f27c48031262f49f6e1a6c88f1852a4cede01661313df8450558c633a23f7ba8
-
SHA512
9a8f2ab58e921f47ed14582e98c0e5020826533ca81659d9c62cecbf8c08d892c0742689b75f3b3f0924b668f096d223a28db4fba07998edbada2973b0ea3913
-
SSDEEP
3072:tvA1p08RqEQAIVEd2gG/vNlo0JFx/pANyCm0PQEKR/JnXHWP:t206xWgGxLxWN40PDKR/JnX2P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 452 wrote to memory of 4740 452 rundll32.exe 95 PID 452 wrote to memory of 4740 452 rundll32.exe 95 PID 452 wrote to memory of 4740 452 rundll32.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc3c42f4f444326cbb44ecfa9b759276_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bc3c42f4f444326cbb44ecfa9b759276_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4340,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4288 /prefetch:81⤵PID:3240