Analysis
-
max time kernel
16s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/08/2024, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
8dabc322f26818ba23dbba0d1ca35859_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8dabc322f26818ba23dbba0d1ca35859_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
8dabc322f26818ba23dbba0d1ca35859_JaffaCakes118.dll
-
Size
157KB
-
MD5
8dabc322f26818ba23dbba0d1ca35859
-
SHA1
32c1236cb4b34a38addc2463b5601a3817c628ca
-
SHA256
4909041c3554af8b003f23d6f461df044e666d8863e58375fdbd26bb2114a210
-
SHA512
bf69a1d9a082b41eb76ddbf050c5b367fd580dd73da41b642f8751b24561c17b93632a6394a60ec119a198fd3a4549469733a1fa873361d1ce46bb22f9352c30
-
SSDEEP
3072:KuicTlHOOltuN8UJkiWOvWTBf5506Y4uHuwaB:Kui6l/l88TnOvWTBA6q
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1712 1320 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2488 wrote to memory of 1320 2488 rundll32.exe 29 PID 2488 wrote to memory of 1320 2488 rundll32.exe 29 PID 2488 wrote to memory of 1320 2488 rundll32.exe 29 PID 2488 wrote to memory of 1320 2488 rundll32.exe 29 PID 2488 wrote to memory of 1320 2488 rundll32.exe 29 PID 2488 wrote to memory of 1320 2488 rundll32.exe 29 PID 2488 wrote to memory of 1320 2488 rundll32.exe 29 PID 1320 wrote to memory of 1712 1320 rundll32.exe 30 PID 1320 wrote to memory of 1712 1320 rundll32.exe 30 PID 1320 wrote to memory of 1712 1320 rundll32.exe 30 PID 1320 wrote to memory of 1712 1320 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8dabc322f26818ba23dbba0d1ca35859_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8dabc322f26818ba23dbba0d1ca35859_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1320 -s 2243⤵
- Program crash
PID:1712
-
-