Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
94b54e2c38dfa7aeb9dc75b639267c3a_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
94b54e2c38dfa7aeb9dc75b639267c3a_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
94b54e2c38dfa7aeb9dc75b639267c3a_JaffaCakes118.dll
-
Size
35KB
-
MD5
94b54e2c38dfa7aeb9dc75b639267c3a
-
SHA1
8cc0cd7e7f3ba647758659abbeb1cef0474005e8
-
SHA256
7c9710653817699e88d737712a6288cfb11b5d0d7164ccd3cff5a58a849b58f5
-
SHA512
6edf78f9698320d08d37503cdda0f1a7636cb3426d6b7222fcc65c37086ab7771d4f30e18e6064bbcc2d2171bc46fefe072f4e13a4d87a52ce9274f58a669c97
-
SSDEEP
768:H4BCD3dA3k3UvtbjNeve8FOf0CmJRstnJTE215eZ4gPn:e4dA3gU1jy0MCAwAie6gPn
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2264 5016 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3864 wrote to memory of 5016 3864 rundll32.exe 91 PID 3864 wrote to memory of 5016 3864 rundll32.exe 91 PID 3864 wrote to memory of 5016 3864 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94b54e2c38dfa7aeb9dc75b639267c3a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\94b54e2c38dfa7aeb9dc75b639267c3a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 5443⤵
- Program crash
PID:2264
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 5016 -ip 50161⤵PID:1448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4508,i,16315016104747277319,5510969007830467313,262144 --variations-seed-version --mojo-platform-channel-handle=3692 /prefetch:81⤵PID:4824