Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
daced29f49a5af2480e75eaeca3bc012_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
daced29f49a5af2480e75eaeca3bc012_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
daced29f49a5af2480e75eaeca3bc012_JaffaCakes118.dll
-
Size
330KB
-
MD5
daced29f49a5af2480e75eaeca3bc012
-
SHA1
fefb27b90ee0decb47b0586bf53b4c1867566568
-
SHA256
21015477e318c468a094a1409c3d6f4178dcec78b4120e240ffeb2da8dab96e2
-
SHA512
db2e3ef38d203ff604d47e61bc75c6c8bcf378a888f3a8905b0acc23328ee71442f7ced38e71f39ac9f5422d546feef418ab768d4f81cf45bc18fb45d057d57c
-
SSDEEP
3072:gRq1sFAd2gQ5PmBvNZwnnq1gn2RvoXiDzAYgrO1v2F5j8eFu:qq1sFAwgwmBv3wnIgG4oAYxvU54eu
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1200 wrote to memory of 3284 1200 rundll32.exe 90 PID 1200 wrote to memory of 3284 1200 rundll32.exe 90 PID 1200 wrote to memory of 3284 1200 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\daced29f49a5af2480e75eaeca3bc012_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\daced29f49a5af2480e75eaeca3bc012_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4380,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=1288 /prefetch:81⤵PID:1344