Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 18:42
Static task
static1
Behavioral task
behavioral1
Sample
70c83607c989aa3833a971f27c9d52e6_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
70c83607c989aa3833a971f27c9d52e6_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
70c83607c989aa3833a971f27c9d52e6_JaffaCakes118.dll
-
Size
65KB
-
MD5
70c83607c989aa3833a971f27c9d52e6
-
SHA1
9da04f928f321d7e01eb5614924484bd0bcd3ed5
-
SHA256
19e9e27851ea2574e8933fe2d9ea426214ea83c2225ec3e5bd856320fa15ecd1
-
SHA512
56c51740e9e51053cc972e4981d59e1cde5b5fdcc56650d1c81093f22b5d1ccf5173f5cfbbd25544488b1af7db93ac536b7aec56322e583377627ac88a67b2c6
-
SSDEEP
1536:TDuyqlrWXIW9Ya2SXaWd9myBC/z4toaf1000:OyaW7YDKF9lk/zcf1n0
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2868 4964 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1172 wrote to memory of 4964 1172 rundll32.exe 84 PID 1172 wrote to memory of 4964 1172 rundll32.exe 84 PID 1172 wrote to memory of 4964 1172 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\70c83607c989aa3833a971f27c9d52e6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\70c83607c989aa3833a971f27c9d52e6_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4964 -s 6163⤵
- Program crash
PID:2868
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4964 -ip 49641⤵PID:548