Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 10:28
Static task
static1
Behavioral task
behavioral1
Sample
8a051d06fc16b93a4199fe85daf884b1_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8a051d06fc16b93a4199fe85daf884b1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8a051d06fc16b93a4199fe85daf884b1_JaffaCakes118.dll
-
Size
296KB
-
MD5
8a051d06fc16b93a4199fe85daf884b1
-
SHA1
889937451cde4b36698ed405142a821610406788
-
SHA256
3ab0d84992adaee5e890f2f1b62c47b159ca6e5ad8c2d59521fa7b6425fb4c0f
-
SHA512
42072e7865a8c4d7476fe9a457877afecdef372723657e3fb7bee1d2658ce89304774aaf91048ac89351bcc183219664206732916f6ce6801033a06544051017
-
SSDEEP
6144:ZeNlNoNOruYR268Z0iMRQ0HhFxRdccMJzVu:ZIl6NOrp9D1RNh/l6u
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1536 4532 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 4608 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4608 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2988 wrote to memory of 4532 2988 rundll32.exe 84 PID 2988 wrote to memory of 4532 2988 rundll32.exe 84 PID 2988 wrote to memory of 4532 2988 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8a051d06fc16b93a4199fe85daf884b1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8a051d06fc16b93a4199fe85daf884b1_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 8123⤵
- Program crash
PID:1536
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x518 0x3fc1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4532 -ip 45321⤵PID:1532