Analysis
-
max time kernel
136s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 13:11
Static task
static1
Behavioral task
behavioral1
Sample
6fb63f7414c8787355ee50ff4d0d7fbb_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6fb63f7414c8787355ee50ff4d0d7fbb_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
6fb63f7414c8787355ee50ff4d0d7fbb_JaffaCakes118.dll
-
Size
21KB
-
MD5
6fb63f7414c8787355ee50ff4d0d7fbb
-
SHA1
e2495f5843c31347bba1437b496552303719a6c2
-
SHA256
8d51e5db10cc21aac8c186afd2947e9da60b85facb483e98c2f22492a8d56e23
-
SHA512
1a6fdb5897f3a9ec8a2461c55bcf81adbd2a97f3f2b0b95ea4c6bba15d41f35cdd5aa476deb19938af30755ef9d2d9cc039944ee94fad6039d3fc0120f94bc03
-
SSDEEP
384:c6V+FCbSqxaEvqbOzYGCkeydM5PDVraj+okgrdmDOwCVXuaa3Igve:yF9q0EvquYGCka5dIoqwMrah
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4780 2284 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3896 wrote to memory of 2284 3896 rundll32.exe 84 PID 3896 wrote to memory of 2284 3896 rundll32.exe 84 PID 3896 wrote to memory of 2284 3896 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6fb63f7414c8787355ee50ff4d0d7fbb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6fb63f7414c8787355ee50ff4d0d7fbb_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 6283⤵
- Program crash
PID:4780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2284 -ip 22841⤵PID:4736