Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
105030c4917a1016e7010ad246d0faf2_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
105030c4917a1016e7010ad246d0faf2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
105030c4917a1016e7010ad246d0faf2_JaffaCakes118.dll
-
Size
29KB
-
MD5
105030c4917a1016e7010ad246d0faf2
-
SHA1
971f161d6d459b8d4a375e5773fe3d9795993f53
-
SHA256
b8256d09fd1d27705538d8c57a6096e07450d2ef6b2b03378b43860ed7cc3db8
-
SHA512
79ec746d08fdf76f76ab7ca3e7f4b0fdb7c4dd2cfc987bdfb26db1a10783e0ba6351ed919070014cf9d29ff815470d075ca721f3b0038ce741375524b0b55027
-
SSDEEP
768:CgRwlvEh8/cM7dGRH0OKdKBBQARQkH/P9MjJ:C2UvEh8FcZKdKBBQARtMV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3232 wrote to memory of 2704 3232 rundll32.exe 89 PID 3232 wrote to memory of 2704 3232 rundll32.exe 89 PID 3232 wrote to memory of 2704 3232 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\105030c4917a1016e7010ad246d0faf2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\105030c4917a1016e7010ad246d0faf2_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4340,i,8293235976513689021,7261015831736501466,262144 --variations-seed-version --mojo-platform-channel-handle=1904 /prefetch:81⤵PID:1060