Analysis
-
max time kernel
127s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 18:41
Static task
static1
Behavioral task
behavioral1
Sample
d4f811f5869206e703643392d7564366_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4f811f5869206e703643392d7564366_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d4f811f5869206e703643392d7564366_JaffaCakes118.dll
-
Size
47KB
-
MD5
d4f811f5869206e703643392d7564366
-
SHA1
d4676b028394919d1b19f094f8688366069fda10
-
SHA256
bddc969e41f3e3c2d4efe68973a99166388fb2c0c105c64385bdf4118bed6b2a
-
SHA512
59ee24ff9ec091bf34c24db41953cc7b3ca58df83033b8daa3662d58697a9c886a4234aa78d0df23e6a3ef857bfbc12cb01694ed4c96ca9a49680a4b5ac47c32
-
SSDEEP
768:VZi3CojbKYD2qbWQAIFxujfXcpKZa/+HefO99TylXUYc6uTk4:VZi3C46LIFxujfXV3HefO99Wl14
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2936 2176 rundll32.exe 90 PID 2176 wrote to memory of 2936 2176 rundll32.exe 90 PID 2176 wrote to memory of 2936 2176 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d4f811f5869206e703643392d7564366_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d4f811f5869206e703643392d7564366_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4288,i,5469445176230119590,7931734017267321834,262144 --variations-seed-version --mojo-platform-channel-handle=3756 /prefetch:81⤵PID:4660