Analysis
-
max time kernel
142s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 02:11
Behavioral task
behavioral1
Sample
086496fb6fe562b586cd3abf1ca6e14a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
086496fb6fe562b586cd3abf1ca6e14a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
086496fb6fe562b586cd3abf1ca6e14a_JaffaCakes118.dll
-
Size
500KB
-
MD5
086496fb6fe562b586cd3abf1ca6e14a
-
SHA1
546392bf66d4bca1fb6a48064e33f98a290c4a4d
-
SHA256
d6b08e641252b2c1e1d0d00c487a26b569c34bbed5f703f2c421f236e957ce0e
-
SHA512
e31bea0b290181e0d4c9ff2b785fd5a3e56b38e434c8b27c41ad518edc21275ba377bdecb95508d1d42a155455a5c4f8f18f282226260119d41dc14dcb15218b
-
SSDEEP
12288:nhxbcg9ZO2sEJAAP9pQbhZG0EsVUg70sq:vbcaZQE59p8Jfug7q
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 57 4940 rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\620084d3a8.dl rundll32.exe File opened for modification C:\Windows\SysWOW64\620084d3a8.dl rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4940 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2284 wrote to memory of 4940 2284 rundll32.exe 89 PID 2284 wrote to memory of 4940 2284 rundll32.exe 89 PID 2284 wrote to memory of 4940 2284 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\086496fb6fe562b586cd3abf1ca6e14a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\086496fb6fe562b586cd3abf1ca6e14a_JaffaCakes118.dll,#12⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1296,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:81⤵PID:4200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34B
MD5e92d9328abcb678b34e6439d9d2d9a94
SHA1cd3c53c35f3b9d29bc754575d0dede38bf50babd
SHA256415424e7334c370469cf00988439c6e25433915e1828245e67fde7eda8c34b0d
SHA512bb89ad09a5c1145f417d36bfe0f70b8b85556a4179c72fe2230e3fe3b9d75b7e39b08d24330d4699b700976bec2a8708b629a87a791c0b0a21db8a04a2c6a4e6