Analysis
-
max time kernel
140s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10-08-2024 08:08
Static task
static1
Behavioral task
behavioral1
Sample
855ea2f40663f47cf5a3f93f3ef055b0_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
855ea2f40663f47cf5a3f93f3ef055b0_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
855ea2f40663f47cf5a3f93f3ef055b0_JaffaCakes118.dll
-
Size
897KB
-
MD5
855ea2f40663f47cf5a3f93f3ef055b0
-
SHA1
702d68a7c0c6f41d8473a49fd5c63763fa6b635d
-
SHA256
773607c47816fd7dc61f6508585af7cd7009bfc0347c9f14cc50f18f24988d01
-
SHA512
a7397c39d3cfcfdb13ca912707acdd7705a32c8f40efdbc1ebc9efc4d00adb92ce7d28a4aa99315609031a85f61ac7f8d4779c4a5b4df8274a09fa95b64cb0f4
-
SSDEEP
24576:q2EOaKXXN7ja0ygk/78ay2p0IEv8WmQPsBXHMxNVsYKs:q2O2YkkpHMxYYJ
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1056 2288 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1368 wrote to memory of 2288 1368 rundll32.exe 28 PID 1368 wrote to memory of 2288 1368 rundll32.exe 28 PID 1368 wrote to memory of 2288 1368 rundll32.exe 28 PID 1368 wrote to memory of 2288 1368 rundll32.exe 28 PID 1368 wrote to memory of 2288 1368 rundll32.exe 28 PID 1368 wrote to memory of 2288 1368 rundll32.exe 28 PID 1368 wrote to memory of 2288 1368 rundll32.exe 28 PID 2288 wrote to memory of 1056 2288 rundll32.exe 29 PID 2288 wrote to memory of 1056 2288 rundll32.exe 29 PID 2288 wrote to memory of 1056 2288 rundll32.exe 29 PID 2288 wrote to memory of 1056 2288 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\855ea2f40663f47cf5a3f93f3ef055b0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\855ea2f40663f47cf5a3f93f3ef055b0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 2643⤵
- Program crash
PID:1056
-
-