Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 22:22
Static task
static1
Behavioral task
behavioral1
Sample
f6f8d389b26d2c18cb8db8c467680db2_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f6f8d389b26d2c18cb8db8c467680db2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f6f8d389b26d2c18cb8db8c467680db2_JaffaCakes118.dll
-
Size
128KB
-
MD5
f6f8d389b26d2c18cb8db8c467680db2
-
SHA1
854ca85acfc22351a6dc655c7606cafd20477416
-
SHA256
b0216385914b47582c226e56de6c70af5d8cc587f688d45e96e14342239014f3
-
SHA512
5691bcbdf91532dd7cf2ec7c5e6d5ecf5f8ab5213d49bb4575088b1e2bf07eaa9783cca2ba1426eb0e91bb757785c3c75dc34f1d2d3158ddc07f3009857cc117
-
SSDEEP
3072:aSc6/AXFS4aMSAI6UcSkR6bLasrB+xKSb:aSc6IguI/qQbLprB+Xb
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4040 wrote to memory of 2244 4040 rundll32.exe 89 PID 4040 wrote to memory of 2244 4040 rundll32.exe 89 PID 4040 wrote to memory of 2244 4040 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f6f8d389b26d2c18cb8db8c467680db2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f6f8d389b26d2c18cb8db8c467680db2_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4508,i,16315016104747277319,5510969007830467313,262144 --variations-seed-version --mojo-platform-channel-handle=1904 /prefetch:81⤵PID:1700