Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 14:43
Static task
static1
Behavioral task
behavioral1
Sample
f3de395f737a8a675ac705add21c87c6_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f3de395f737a8a675ac705add21c87c6_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f3de395f737a8a675ac705add21c87c6_JaffaCakes118.dll
-
Size
340KB
-
MD5
f3de395f737a8a675ac705add21c87c6
-
SHA1
59bfc28785f2fddd1af37d4b513fd9eab1be10e0
-
SHA256
4690f6c47f3e060e7c51f509d13202cdbcf67f3fbb148548bf409710be9e2041
-
SHA512
4e7f650d75b34a25821ff58792382984bf1a5d1568749f0c8c67c55246579511ef9e14270b77713ea06107f0f178d2cd36706ac488ae772be43175fb61f44fed
-
SSDEEP
3072:yvA1p08RqEQAIVEd2gG/vNlo0JFx/pANyCm0PQEKR/JnXHWP:y206xWgGxLxWN40PDKR/JnX2P
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3664 wrote to memory of 2060 3664 rundll32.exe 89 PID 3664 wrote to memory of 2060 3664 rundll32.exe 89 PID 3664 wrote to memory of 2060 3664 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f3de395f737a8a675ac705add21c87c6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f3de395f737a8a675ac705add21c87c6_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4628,i,16315016104747277319,5510969007830467313,262144 --variations-seed-version --mojo-platform-channel-handle=1040 /prefetch:81⤵PID:4820