Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 11:28
Behavioral task
behavioral1
Sample
e4ac5c8f86d34d045310b8eaff59b58b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4ac5c8f86d34d045310b8eaff59b58b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e4ac5c8f86d34d045310b8eaff59b58b_JaffaCakes118.dll
-
Size
207KB
-
MD5
e4ac5c8f86d34d045310b8eaff59b58b
-
SHA1
f1d4c716f5d49be4a98ef076947a2ebbb4306e16
-
SHA256
235dda0d319265b0f09c37d69b11a3fc9a3449cb3e647583705285dee13b6419
-
SHA512
571f238bb2070f9962f5080c5968afa5ab31fb83ffe6875e1848e69292e72cee259974ce4bb8cd233965a8b38d700323ae6f424fad52a1e74c85336ff0f3cd80
-
SSDEEP
3072:KlC60GeD6N9Za5Yp6zPC952DmKX0tDV2/jqBkLcP6j5UDpzT5G:KNxfaWUzPWEKKX0pURLcyjUpzY
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1556 wrote to memory of 5104 1556 rundll32.exe 87 PID 1556 wrote to memory of 5104 1556 rundll32.exe 87 PID 1556 wrote to memory of 5104 1556 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e4ac5c8f86d34d045310b8eaff59b58b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e4ac5c8f86d34d045310b8eaff59b58b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4288,i,12470628711992022444,7767535593390851522,262144 --variations-seed-version --mojo-platform-channel-handle=3780 /prefetch:81⤵PID:1812