Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 22:19
Static task
static1
Behavioral task
behavioral1
Sample
df0053baf9f033d3675c856dec26ada6_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df0053baf9f033d3675c856dec26ada6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
df0053baf9f033d3675c856dec26ada6_JaffaCakes118.dll
-
Size
8KB
-
MD5
df0053baf9f033d3675c856dec26ada6
-
SHA1
88de3e1b59146af813c5363119820026da469147
-
SHA256
98306605fd1435396a71dc04db643f4e9fa7d3ded958034e1a3a827e8237414b
-
SHA512
4344473dbde2ad93d05ec6866eff81cea9848cd5f3895713e3291880481d4b15accda8c50477665fc0b5bd26c958962ea7752f1484df3f75663108004ecc5297
-
SSDEEP
96:nP+A/dChd6kwoSJNAngD+PLKIoyNSjcWTvRMPLx71ZEn:nR0hd5HUUtoyIjcWTOPxIn
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1712 2368 rundll32.exe 90 PID 2368 wrote to memory of 1712 2368 rundll32.exe 90 PID 2368 wrote to memory of 1712 2368 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df0053baf9f033d3675c856dec26ada6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df0053baf9f033d3675c856dec26ada6_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4104,i,13995403245988825027,7033610968827661507,262144 --variations-seed-version --mojo-platform-channel-handle=4228 /prefetch:81⤵PID:2216