Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
43511e4861a36d6176b3da332c449868_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43511e4861a36d6176b3da332c449868_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
43511e4861a36d6176b3da332c449868_JaffaCakes118.dll
-
Size
24KB
-
MD5
43511e4861a36d6176b3da332c449868
-
SHA1
ff16b67dac578f8cfd9b06663b2f914a9871b1c6
-
SHA256
935e100b0e144bba0a89f801a1d5952c397f030157636ad739cbb08d9b21b0f3
-
SHA512
51df705b0982875833ae2d538df35f6a8688a7e0b56e1f57904c320c0c8fbc7eecd9689c7f5ced75aacd0bde307c5d4ba48118999cd824db2e1fd53086d462e0
-
SSDEEP
768:PJ5zdDBFf0NU5zq5UarwYI36L4CmJiz2xX:PjHWNoGGKL4CmYax
Malware Config
Signatures
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum rundll32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1592 4392 WerFault.exe 83 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3952 wrote to memory of 4392 3952 rundll32.exe 83 PID 3952 wrote to memory of 4392 3952 rundll32.exe 83 PID 3952 wrote to memory of 4392 3952 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43511e4861a36d6176b3da332c449868_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43511e4861a36d6176b3da332c449868_JaffaCakes118.dll,#12⤵
- Maps connected drives based on registry
PID:4392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 6283⤵
- Program crash
PID:1592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4392 -ip 43921⤵PID:4496