Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
eb14c69a9358804c8890d7444968e59a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb14c69a9358804c8890d7444968e59a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eb14c69a9358804c8890d7444968e59a_JaffaCakes118.dll
-
Size
356KB
-
MD5
eb14c69a9358804c8890d7444968e59a
-
SHA1
7b5df5f3fcf0645d3b0c9d3f48054efe804be31d
-
SHA256
447512d3b2da5639ba43b5499d96d41e225039aab4129481310aec61ff752908
-
SHA512
bd35eb1ff0ad9a85487810d2ace2292ec7f90f879fe1173f7f589a239cd9b79c8fe07c832252ba7d1d26194854caf2795739d1aa5c88ef871874a9144bc1d8a5
-
SSDEEP
6144:aUv2mqD22+OBM1sHsfRKXCAYWYmKBEkh1E:Vv2O8M1sUKXFoh1E
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1448 wrote to memory of 4036 1448 rundll32.exe 89 PID 1448 wrote to memory of 4036 1448 rundll32.exe 89 PID 1448 wrote to memory of 4036 1448 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb14c69a9358804c8890d7444968e59a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eb14c69a9358804c8890d7444968e59a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1996,i,5469445176230119590,7931734017267321834,262144 --variations-seed-version --mojo-platform-channel-handle=3756 /prefetch:81⤵PID:3668