Analysis
-
max time kernel
131s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 02:11
Static task
static1
Behavioral task
behavioral1
Sample
22c1b894002c6ffd1fdc2a75b48ddcda_JaffaCakes118.dll
Resource
win7-20240221-en
General
-
Target
22c1b894002c6ffd1fdc2a75b48ddcda_JaffaCakes118.dll
-
Size
723KB
-
MD5
22c1b894002c6ffd1fdc2a75b48ddcda
-
SHA1
5037543f108882d6a0d5b1907d125d40e4126e32
-
SHA256
c91229d90c423cd5b5bf870cec714e5c956058c62f4b2036607d44f1767c50d2
-
SHA512
67fe107a5bf13fa041eed46c4477ced5fd1af826cd6fc7e5b0661f3690d1a1eeeb69973ef9ccb50c13bc38740711ad0070daaa4b23ef49c9f28c164a881c4a67
-
SSDEEP
6144:GuPnPogxyU47hhfJHOtrfIx2yDsOyXMPfMPTPtP/PvPxPLPLPVPbPPxPTPDpP/PY:G4A8h4l1Rmr02GsOynnx9VQ
Malware Config
Extracted
zloader
bat1k3
bat1k3
http://as9897234135.xyz/LKhwojehDgwegSDG/gateJKjdsh.php
http://as9897234135.org/LKhwojehDgwegSDG/gateJKjdsh.php
http://as9897234135.net/LKhwojehDgwegSDG/gateJKjdsh.php
http://as9897234135.in/LKhwojehDgwegSDG/gateJKjdsh.php
http://as9897234135.com/LKhwojehDgwegSDG/gateJKjdsh.php
-
build_id
37
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4728 4424 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3196 wrote to memory of 4424 3196 rundll32.exe 83 PID 3196 wrote to memory of 4424 3196 rundll32.exe 83 PID 3196 wrote to memory of 4424 3196 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22c1b894002c6ffd1fdc2a75b48ddcda_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\22c1b894002c6ffd1fdc2a75b48ddcda_JaffaCakes118.dll,#12⤵PID:4424
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 6083⤵
- Program crash
PID:4728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4424 -ip 44241⤵PID:688