Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 03:06
Static task
static1
Behavioral task
behavioral1
Sample
df6045797e353a494a1b21e628947495_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df6045797e353a494a1b21e628947495_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
df6045797e353a494a1b21e628947495_JaffaCakes118.dll
-
Size
215KB
-
MD5
df6045797e353a494a1b21e628947495
-
SHA1
ea87a5ede9b263530d954e75eb52437515e423b7
-
SHA256
50d0f6410e144261204f86426ca4f5b4459354979215878ed99522cf57a1ec06
-
SHA512
da6b3ec367818732f449123474e3e6dc04fe693eb100b906655a6d1686bebf71f37936d7caf5dd6684422c20cab7866fa3d65decd17f2345d955e1a2a2f35495
-
SSDEEP
6144:Z4dwX2DKMu7ZKpqinZGWQtanWcwSsqOWfM9L0p:Z+wmMNK8icWdn+t9L2
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5016 wrote to memory of 2236 5016 rundll32.exe 90 PID 5016 wrote to memory of 2236 5016 rundll32.exe 90 PID 5016 wrote to memory of 2236 5016 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df6045797e353a494a1b21e628947495_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df6045797e353a494a1b21e628947495_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4252,i,2727319350781907497,7925939240893079607,262144 --variations-seed-version --mojo-platform-channel-handle=3952 /prefetch:81⤵PID:3952