Analysis

  • max time kernel
    131s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-09-2024 11:46

General

  • Target

    e01dde5a421e16de3563c3a74b34809e_JaffaCakes118.dll

  • Size

    114KB

  • MD5

    e01dde5a421e16de3563c3a74b34809e

  • SHA1

    aa3fd95797ba5a62b5665d874467e53cbb1b777a

  • SHA256

    2aea243ad153488588c92d1fa93b7c80016ba258ec8f56789700c1daf60d2bd0

  • SHA512

    b989cb5893e7b62fb91b431e2ca56400d475f26e0c18ea9b5fa5f90509c86b1baeb4703cbc5adddd328118cbb2d8973862abd2988a258d4074e116c6585db563

  • SSDEEP

    3072:vOFj7uKMoAwOSxoPMVsf0nQla8vxgs2N+r3rJ:WFvORgPvSCsDr3rJ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e01dde5a421e16de3563c3a74b34809e_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1720
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e01dde5a421e16de3563c3a74b34809e_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1424
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4460,i,4174666705242427184,7333705955694532165,262144 --variations-seed-version --mojo-platform-channel-handle=1040 /prefetch:8
    1⤵
      PID:3324

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1424-0-0x0000000010000000-0x0000000010025000-memory.dmp

      Filesize

      148KB

    • memory/1424-1-0x0000000002940000-0x000000000296C000-memory.dmp

      Filesize

      176KB

    • memory/1424-4-0x0000000002B00000-0x0000000002B01000-memory.dmp

      Filesize

      4KB

    • memory/1424-10-0x0000000002920000-0x0000000002921000-memory.dmp

      Filesize

      4KB

    • memory/1424-9-0x0000000002B10000-0x0000000002B11000-memory.dmp

      Filesize

      4KB

    • memory/1424-8-0x0000000002AD0000-0x0000000002AD1000-memory.dmp

      Filesize

      4KB

    • memory/1424-7-0x0000000002930000-0x0000000002931000-memory.dmp

      Filesize

      4KB

    • memory/1424-6-0x0000000002AE0000-0x0000000002AE1000-memory.dmp

      Filesize

      4KB

    • memory/1424-2-0x0000000002B30000-0x0000000002B31000-memory.dmp

      Filesize

      4KB

    • memory/1424-3-0x0000000002910000-0x0000000002911000-memory.dmp

      Filesize

      4KB

    • memory/1424-5-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

      Filesize

      4KB

    • memory/1424-11-0x0000000002B70000-0x0000000002B71000-memory.dmp

      Filesize

      4KB

    • memory/1424-13-0x0000000002B60000-0x0000000002B61000-memory.dmp

      Filesize

      4KB

    • memory/1424-15-0x0000000002C20000-0x0000000002C21000-memory.dmp

      Filesize

      4KB

    • memory/1424-14-0x0000000002C30000-0x0000000002C31000-memory.dmp

      Filesize

      4KB

    • memory/1424-17-0x0000000002C40000-0x0000000002C41000-memory.dmp

      Filesize

      4KB

    • memory/1424-16-0x0000000002C50000-0x0000000002C51000-memory.dmp

      Filesize

      4KB

    • memory/1424-12-0x0000000002B40000-0x0000000002B41000-memory.dmp

      Filesize

      4KB