Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 13:15
Static task
static1
Behavioral task
behavioral1
Sample
8631e2b954a9d520110897521452a391_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8631e2b954a9d520110897521452a391_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8631e2b954a9d520110897521452a391_JaffaCakes118.dll
-
Size
23KB
-
MD5
8631e2b954a9d520110897521452a391
-
SHA1
d3e4f2f17a279c8ba4376093edbd30b648962faa
-
SHA256
f0c6c67f480125be15719b9a3ac3fcec8f353be7ecc50d2ef85b4cf9b3ab16fa
-
SHA512
b09c77ae2310d6c788effc35f9ad682cf6f2a6e3b1d087b43461e0c624d9b07a9e6e713b70593ee2d7160fb4b0e9106bfc195d041d93785cc7faf81f14cfe885
-
SSDEEP
384:XtWCvqqLCyMzcwKEhJkA/bP8mKaO4yALMLAIDW1dEfnmnMXkZyN9oGNVx:QGq4Cx5KEc+bP8mKUxILbKvEfnvmFGP
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\RemoteDbg.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\RemoteDbg.dll rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1568 3360 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3360 rundll32.exe 3360 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3360 2084 rundll32.exe 91 PID 2084 wrote to memory of 3360 2084 rundll32.exe 91 PID 2084 wrote to memory of 3360 2084 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8631e2b954a9d520110897521452a391_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8631e2b954a9d520110897521452a391_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3360 -s 6483⤵
- Program crash
PID:1568
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3360 -ip 33601⤵PID:2760
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4616,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=1008 /prefetch:81⤵PID:1072