Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 23:03
Behavioral task
behavioral1
Sample
f94f17ecddf492a4b67ca8cf4046ad9e_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f94f17ecddf492a4b67ca8cf4046ad9e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f94f17ecddf492a4b67ca8cf4046ad9e_JaffaCakes118.dll
-
Size
23KB
-
MD5
f94f17ecddf492a4b67ca8cf4046ad9e
-
SHA1
11bd42b8862a0db3abf29e01d797e125d711e526
-
SHA256
1366a85d3b8371d3073a710b19b38a3871569f157dd37fe916fb621eea5f2367
-
SHA512
548dcab1f3eb46f4072f65aae99c4b2c388829ae911c43757a3158302d864a7c75b300742804129ef046ed98d857b66965382bfd24a66cb3b31257036fab6235
-
SSDEEP
384:jjaUxz0ClwXqd+1egQKZryiH+Af1Rc8KgGwysAzmPAA6ytB5e:aRCl+qdSHQOuM+Af1lzyBmnj5
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1220 wrote to memory of 860 1220 rundll32.exe 89 PID 1220 wrote to memory of 860 1220 rundll32.exe 89 PID 1220 wrote to memory of 860 1220 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f94f17ecddf492a4b67ca8cf4046ad9e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f94f17ecddf492a4b67ca8cf4046ad9e_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4128,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=4076 /prefetch:81⤵PID:4800