Analysis
-
max time kernel
131s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 17:15
Static task
static1
Behavioral task
behavioral1
Sample
e0a62678fb9743a1e15c03b70240505f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e0a62678fb9743a1e15c03b70240505f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e0a62678fb9743a1e15c03b70240505f_JaffaCakes118.dll
-
Size
330KB
-
MD5
e0a62678fb9743a1e15c03b70240505f
-
SHA1
8dae7d5a2104939060c3738c8190340885cdf916
-
SHA256
344947a2796ae9e1bbf56edaa7c3abe6fc4e919c91405585c9565e9584286b51
-
SHA512
571ab209c6161b6528717421ef63434a3ce9357a79be054c190c8911ae30c03cac2fb41d85eb443d009df90fa5eceabdc4b09aee2394c7dadacc113e63728997
-
SSDEEP
3072:fRq1sFAd2gQ5PmBvNZwnnq1gn2RvoXiDzAYgrO1v2F5j81qc:pq1sFAwgwmBv3wnIgG4oAYxvU54gc
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3948 wrote to memory of 5004 3948 rundll32.exe 90 PID 3948 wrote to memory of 5004 3948 rundll32.exe 90 PID 3948 wrote to memory of 5004 3948 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e0a62678fb9743a1e15c03b70240505f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e0a62678fb9743a1e15c03b70240505f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4324,i,12198811467968044966,17227406646827438786,262144 --variations-seed-version --mojo-platform-channel-handle=3880 /prefetch:81⤵PID:4512