Analysis
-
max time kernel
134s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 20:37
Behavioral task
behavioral1
Sample
68d76e65c5d7a211f1c4b9343d65b443_JaffaCakes118.dll
Resource
win7-20240708-en
3 signatures
150 seconds
General
-
Target
68d76e65c5d7a211f1c4b9343d65b443_JaffaCakes118.dll
-
Size
30KB
-
MD5
68d76e65c5d7a211f1c4b9343d65b443
-
SHA1
1206e4fa837f0477dbdfe5309d3b38680a2f3563
-
SHA256
20983a66e9ed0926b50e6e3b25a5592b1910475d9b5679c5bf3b4c83de6301ff
-
SHA512
00d44322b41a293ac66b8cd83c4ab8465f5cf2a984e19a43d1f127dabd87914301719605a485dc7b10b7bb34a85fd0fae21b44ba3b1473c08702c8c7d992154f
-
SSDEEP
768:jA/BGIed/IY0uysHYf+aBiZT7YUJ8znbcuyD7UzX:s/O/IkP9a4Z7uznouy8zX
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1824-0-0x0000000010000000-0x0000000010014000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 616 1824 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4928 wrote to memory of 1824 4928 rundll32.exe 83 PID 4928 wrote to memory of 1824 4928 rundll32.exe 83 PID 4928 wrote to memory of 1824 4928 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\68d76e65c5d7a211f1c4b9343d65b443_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\68d76e65c5d7a211f1c4b9343d65b443_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1824 -s 5723⤵
- Program crash
PID:616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1824 -ip 18241⤵PID:4984