Analysis
-
max time kernel
124s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 01:16
Behavioral task
behavioral1
Sample
dd642c542981783db4368a75e3c57102_JaffaCakes118.dll
Resource
win7-20240903-en
3 signatures
150 seconds
General
-
Target
dd642c542981783db4368a75e3c57102_JaffaCakes118.dll
-
Size
80KB
-
MD5
dd642c542981783db4368a75e3c57102
-
SHA1
73b33cd718f4ef85af5776af6ff64173aeb95f19
-
SHA256
58ef09297c4f441669d11b5d2ae83aa51b7644e7e2c6091df86a771d458bb205
-
SHA512
3f3adadcf0ce44c053c26ca7ffedbb55ba45dbb94f3cfb37f524aa128c4ed07a845d0e555ec6ae8468ecfea257632bdb858dac5d096b9705ed7a23b50e879bfe
-
SSDEEP
1536:n1P3M7ctAfbdosRfzSTGLBwk4F2USblWEYNjwI+bH5GVYeIfMy:n107PdnzSYBw12USblktwD5dh
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1492-0-0x0000000010000000-0x000000001000E000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1340 wrote to memory of 1492 1340 rundll32.exe 90 PID 1340 wrote to memory of 1492 1340 rundll32.exe 90 PID 1340 wrote to memory of 1492 1340 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dd642c542981783db4368a75e3c57102_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dd642c542981783db4368a75e3c57102_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4060,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4156 /prefetch:81⤵PID:2340