Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
15fde1f9a4ac2cdd139ec0aa464cd96f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15fde1f9a4ac2cdd139ec0aa464cd96f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
15fde1f9a4ac2cdd139ec0aa464cd96f_JaffaCakes118.dll
-
Size
91KB
-
MD5
15fde1f9a4ac2cdd139ec0aa464cd96f
-
SHA1
71b32c264344e3ddc6ffac0f53b6cd8e31f2cc92
-
SHA256
05ca944f94d9c259409adcb743a0c064fd151a36228bd31bb00dcad6d7cfceb7
-
SHA512
62bd329e7b222a09f5fccde78d319bc273c9552949115ea0d938e114ded6c3143c2beb0659b91caeaa4a79b5604fec198d0c99716f3501350abbd2e089f4e6ef
-
SSDEEP
1536:OdYeixIeYUskeh7GdtRE+zuoiUPdziMF4fRz51g1nO+pEpyYaEpybrJJkoDYt9FF:S1ixIeukEEJ8v1g1nOQE0EerJJkoDYtj
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2064 rundll32.exe 2064 rundll32.exe 2064 rundll32.exe 2064 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2064 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4076 wrote to memory of 2064 4076 rundll32.exe 89 PID 4076 wrote to memory of 2064 4076 rundll32.exe 89 PID 4076 wrote to memory of 2064 4076 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15fde1f9a4ac2cdd139ec0aa464cd96f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15fde1f9a4ac2cdd139ec0aa464cd96f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4152,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4308 /prefetch:81⤵PID:2512