Analysis
-
max time kernel
131s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 07:59
Static task
static1
Behavioral task
behavioral1
Sample
d3e5dd144527a36515fff1596a606f7d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3e5dd144527a36515fff1596a606f7d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d3e5dd144527a36515fff1596a606f7d_JaffaCakes118.dll
-
Size
340KB
-
MD5
d3e5dd144527a36515fff1596a606f7d
-
SHA1
11209044cd0457f2612753032e85136c75c6890d
-
SHA256
9791b2fb000c0147b590d39aa7701f272f8dce70fdf60f97271a2fddb44a7abe
-
SHA512
544f611dfb9344c694b4fd0630204f3ad6fc915ce245b468d06195ae601c64d6fbd45387138fe8cff3b337dfc2be71f138dbecbddc32cc9aa1912a2956c9cb7f
-
SSDEEP
3072:kvA1p08RqEQAIVEd2gG/vNlo0JFx/pANyCm0PQEKR/JnXHWP:k206xWgGxLxWN40PDKR/JnX2P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3516 wrote to memory of 3884 3516 rundll32.exe 90 PID 3516 wrote to memory of 3884 3516 rundll32.exe 90 PID 3516 wrote to memory of 3884 3516 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d3e5dd144527a36515fff1596a606f7d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d3e5dd144527a36515fff1596a606f7d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4256,i,11708048364682646792,608099842549576907,262144 --variations-seed-version --mojo-platform-channel-handle=4412 /prefetch:81⤵PID:3248