Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 12:42
Static task
static1
Behavioral task
behavioral1
Sample
136756b928465500c14eafbc1c112c5a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
136756b928465500c14eafbc1c112c5a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
136756b928465500c14eafbc1c112c5a_JaffaCakes118.dll
-
Size
38KB
-
MD5
136756b928465500c14eafbc1c112c5a
-
SHA1
13f2a3aefcb82452a77f22e0e8c50342c24b8a8a
-
SHA256
75c91192ac4094c1739ed8b60d2dd8ab246888c3c2472666a7498a1e9c992c32
-
SHA512
c01e9d78383866401dbf6fff8a9aad1056b76dc328f22a66bb7832081760c820386a09595021598bc6061a4fcac636196a85c1cefe4416b89d040c92d96fe976
-
SSDEEP
768:UyWhHKyWz9WYeJK9poW5wq9aPN73gRnGmks5MqVg:UpV969WZJKQW5YPN73gAmks5FV
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4436 wrote to memory of 2704 4436 rundll32.exe 89 PID 4436 wrote to memory of 2704 4436 rundll32.exe 89 PID 4436 wrote to memory of 2704 4436 rundll32.exe 89 PID 2704 wrote to memory of 2920 2704 rundll32.exe 90 PID 2704 wrote to memory of 2920 2704 rundll32.exe 90 PID 2704 wrote to memory of 2920 2704 rundll32.exe 90 PID 2920 wrote to memory of 4812 2920 net.exe 92 PID 2920 wrote to memory of 4812 2920 net.exe 92 PID 2920 wrote to memory of 4812 2920 net.exe 92 PID 2704 wrote to memory of 2440 2704 rundll32.exe 93 PID 2704 wrote to memory of 2440 2704 rundll32.exe 93 PID 2704 wrote to memory of 2440 2704 rundll32.exe 93 PID 2440 wrote to memory of 4472 2440 net.exe 95 PID 2440 wrote to memory of 4472 2440 net.exe 95 PID 2440 wrote to memory of 4472 2440 net.exe 95
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\136756b928465500c14eafbc1c112c5a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\136756b928465500c14eafbc1c112c5a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\net.exenet stop winss3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop winss4⤵
- System Location Discovery: System Language Discovery
PID:4812
-
-
-
C:\Windows\SysWOW64\net.exenet stop OcHealthMon3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop OcHealthMon4⤵
- System Location Discovery: System Language Discovery
PID:4472
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4388,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=3864 /prefetch:81⤵PID:1008