Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 22:59
Behavioral task
behavioral1
Sample
719948fcc7b5a94fa5385af6334566bc_JaffaCakes118.dll
Resource
win7-20240708-en
5 signatures
150 seconds
General
-
Target
719948fcc7b5a94fa5385af6334566bc_JaffaCakes118.dll
-
Size
148KB
-
MD5
719948fcc7b5a94fa5385af6334566bc
-
SHA1
aed4d9e87a8c9e96d5ddb3c98d55e0120e46c697
-
SHA256
9208fe6d08d42a609812665848dd4bb1629c801841ab12e53541d8ba6a17125a
-
SHA512
6004b4ec80fa1d3300c52f6aa8bb5dddf1054b07b1b53e4d2d6f51be2b5bcd47023aab939c2737fca76c94b4a1d9fac2b12cc140d1e7a4513037651025901518
-
SSDEEP
3072:RQ4eua3OTgH7s/SM25AJ9QT8b2giYTBftZGIQhiSMhKzeE:Ded3OQoaMTojYTBlZGI20hS/
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1984-0-0x0000000010000000-0x0000000010027000-memory.dmp family_gh0strat -
Program crash 1 IoCs
pid pid_target Process procid_target 2000 1984 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1984 2012 rundll32.exe 30 PID 2012 wrote to memory of 1984 2012 rundll32.exe 30 PID 2012 wrote to memory of 1984 2012 rundll32.exe 30 PID 2012 wrote to memory of 1984 2012 rundll32.exe 30 PID 2012 wrote to memory of 1984 2012 rundll32.exe 30 PID 2012 wrote to memory of 1984 2012 rundll32.exe 30 PID 2012 wrote to memory of 1984 2012 rundll32.exe 30 PID 1984 wrote to memory of 2000 1984 rundll32.exe 31 PID 1984 wrote to memory of 2000 1984 rundll32.exe 31 PID 1984 wrote to memory of 2000 1984 rundll32.exe 31 PID 1984 wrote to memory of 2000 1984 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\719948fcc7b5a94fa5385af6334566bc_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\719948fcc7b5a94fa5385af6334566bc_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 2243⤵
- Program crash
PID:2000
-
-