Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
01-08-2024 21:08
Static task
static1
Behavioral task
behavioral1
Sample
81c4acd9fa6210d49e5c2f5809deb060_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
81c4acd9fa6210d49e5c2f5809deb060_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
81c4acd9fa6210d49e5c2f5809deb060_JaffaCakes118.dll
-
Size
49KB
-
MD5
81c4acd9fa6210d49e5c2f5809deb060
-
SHA1
2d88cd1838fe0fec6ebf26849932da4aeab510f9
-
SHA256
420a5475de0ef90a738b65031f470c5fff9c27baa3abee2fadda51ce6e9945f2
-
SHA512
5d489bbc0f4c82306f6afd3aa34c9704a898b311792b5464e5ae58a6fc0ab1cfabeae4a3e3293bdce1894a32bcb7029a41b1b1524c4fea488fb981c1a702ef71
-
SSDEEP
768:c3niJqLQbLyBwSheSFIWre97mbv7pAar2JxJq10BsplRn3Bi4ytMwM34FI7oa8x:c3iJqLQf2mWE8v7owpnQ6Z3+jx
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1440 2036 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1988 wrote to memory of 2036 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2036 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2036 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2036 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2036 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2036 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2036 1988 rundll32.exe rundll32.exe PID 2036 wrote to memory of 1440 2036 rundll32.exe WerFault.exe PID 2036 wrote to memory of 1440 2036 rundll32.exe WerFault.exe PID 2036 wrote to memory of 1440 2036 rundll32.exe WerFault.exe PID 2036 wrote to memory of 1440 2036 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81c4acd9fa6210d49e5c2f5809deb060_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81c4acd9fa6210d49e5c2f5809deb060_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 2323⤵
- Program crash
PID:1440