Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 07:31
Static task
static1
Behavioral task
behavioral1
Sample
d165fb516b8941ddac57cfd89b42a14e_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d165fb516b8941ddac57cfd89b42a14e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d165fb516b8941ddac57cfd89b42a14e_JaffaCakes118.dll
-
Size
964KB
-
MD5
d165fb516b8941ddac57cfd89b42a14e
-
SHA1
fb66bfb38db3aa36a917b408963a0f721204e238
-
SHA256
4bc55e1ebfad8ccc6031156b54d9c189eed70b2758266df8de713d80cc9a9f14
-
SHA512
b4d138fb61f3c883aabf7df81abed3a1ff4b66513f77292bfa95527f4a3611dcb4e54b893ebb141fcb11469f2a997198c4b98abbcc732aa16a9c88103baeda68
-
SSDEEP
12288:NeK016Oam4hC86zWyMHktlJHPVPLgrjaY:oekW/HsLLg/a
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 688 wrote to memory of 2356 688 rundll32.exe 90 PID 688 wrote to memory of 2356 688 rundll32.exe 90 PID 688 wrote to memory of 2356 688 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d165fb516b8941ddac57cfd89b42a14e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d165fb516b8941ddac57cfd89b42a14e_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1440,i,5469445176230119590,7931734017267321834,262144 --variations-seed-version --mojo-platform-channel-handle=4288 /prefetch:81⤵PID:4980