Analysis
-
max time kernel
130s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 17:07
Static task
static1
Behavioral task
behavioral1
Sample
143598ea8dcc7372f8c3fedfca8e2ef9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
143598ea8dcc7372f8c3fedfca8e2ef9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
143598ea8dcc7372f8c3fedfca8e2ef9_JaffaCakes118.dll
-
Size
148KB
-
MD5
143598ea8dcc7372f8c3fedfca8e2ef9
-
SHA1
206217282d86f164d196df7e537c13f0be3a7e0a
-
SHA256
d68304424f68787748f44059eeeb76717f85e8d19e89479778793ec318943d70
-
SHA512
7a1edf304c02ebc9edcd5e0a85ea6daebe5c5e26b29991d887bb6b39dc14c0a5d981cb303bc8d85264cfe579e3fc4bba7e7cae74bdf63d6050949ec219b801d8
-
SSDEEP
1536:BIMUIVIjkuvfZ/AuwVqJ/yzsaEDKXXR9emNYXaGKb9rOxY/VP94t:Bei8xvfG4QspKOKR/1
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3668 wrote to memory of 556 3668 rundll32.exe 89 PID 3668 wrote to memory of 556 3668 rundll32.exe 89 PID 3668 wrote to memory of 556 3668 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\143598ea8dcc7372f8c3fedfca8e2ef9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\143598ea8dcc7372f8c3fedfca8e2ef9_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4388,i,3210801877307184477,8078594481454001567,262144 --variations-seed-version --mojo-platform-channel-handle=3864 /prefetch:81⤵PID:4736