Analysis
-
max time kernel
142s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-09-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
d8efc444e9770aa6008969a939233b24_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d8efc444e9770aa6008969a939233b24_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d8efc444e9770aa6008969a939233b24_JaffaCakes118.dll
-
Size
330KB
-
MD5
d8efc444e9770aa6008969a939233b24
-
SHA1
3253019b315fe4a3b65075ba9b87a7f62dc7de95
-
SHA256
5370bc3bae9eeb30f2485701513aa7403a0dd4f08aaa0a69da8de33dad85b5ca
-
SHA512
05a241febce0cc5eb42075b3aa2a05dab48495fc66362c0e2dbca9ed8c3efa7f6b0e4d2c17fade666c0c09f5020eae7f999009960117ce27dcddfbb76bb6fd28
-
SSDEEP
3072:rRq1sFAd2gQ5PmBvNZwnnq1gn2RvoXiDzAYgrO1v2F5j81qc:Nq1sFAwgwmBv3wnIgG4oAYxvU54gc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3420 wrote to memory of 1360 3420 rundll32.exe 90 PID 3420 wrote to memory of 1360 3420 rundll32.exe 90 PID 3420 wrote to memory of 1360 3420 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8efc444e9770aa6008969a939233b24_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d8efc444e9770aa6008969a939233b24_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3768,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=3756 /prefetch:81⤵PID:3332