Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-07-2024 20:59
Static task
static1
Behavioral task
behavioral1
Sample
43511e4861a36d6176b3da332c449868_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43511e4861a36d6176b3da332c449868_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
43511e4861a36d6176b3da332c449868_JaffaCakes118.dll
-
Size
24KB
-
MD5
43511e4861a36d6176b3da332c449868
-
SHA1
ff16b67dac578f8cfd9b06663b2f914a9871b1c6
-
SHA256
935e100b0e144bba0a89f801a1d5952c397f030157636ad739cbb08d9b21b0f3
-
SHA512
51df705b0982875833ae2d538df35f6a8688a7e0b56e1f57904c320c0c8fbc7eecd9689c7f5ced75aacd0bde307c5d4ba48118999cd824db2e1fd53086d462e0
-
SSDEEP
768:PJ5zdDBFf0NU5zq5UarwYI36L4CmJiz2xX:PjHWNoGGKL4CmYax
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2700 2092 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2092 2648 rundll32.exe 30 PID 2648 wrote to memory of 2092 2648 rundll32.exe 30 PID 2648 wrote to memory of 2092 2648 rundll32.exe 30 PID 2648 wrote to memory of 2092 2648 rundll32.exe 30 PID 2648 wrote to memory of 2092 2648 rundll32.exe 30 PID 2648 wrote to memory of 2092 2648 rundll32.exe 30 PID 2648 wrote to memory of 2092 2648 rundll32.exe 30 PID 2092 wrote to memory of 2700 2092 rundll32.exe 31 PID 2092 wrote to memory of 2700 2092 rundll32.exe 31 PID 2092 wrote to memory of 2700 2092 rundll32.exe 31 PID 2092 wrote to memory of 2700 2092 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43511e4861a36d6176b3da332c449868_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43511e4861a36d6176b3da332c449868_JaffaCakes118.dll,#12⤵
- Maps connected drives based on registry
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 2123⤵
- Program crash
PID:2700
-
-