Analysis
-
max time kernel
139s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 17:15
Behavioral task
behavioral1
Sample
96f2c8bca816cc30057f5ea61136121a_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
2 signatures
150 seconds
General
-
Target
96f2c8bca816cc30057f5ea61136121a_JaffaCakes118.dll
-
Size
28KB
-
MD5
96f2c8bca816cc30057f5ea61136121a
-
SHA1
04b3acd28b3519e0995d5291211a5822f23902ef
-
SHA256
51e4f8be749c0bf36baffdd032a164b0e8df6ede5da141dab900afc9cff3994e
-
SHA512
e121e87b24a2ad9ebe377a51a45eb26cbbc5a2d34ecd08168ebc2d017221cc73be2c04ac2596a3b637f5cc91c622daa9e33490fc1554520178eaa276fe9fc635
-
SSDEEP
768:3t5XL7wcxzvLPlld94+yUiRil5pGyjS2S/jWx:3j7hLLdlnyUSSQy22Sbe
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/5096-0-0x0000000010000000-0x0000000010014000-memory.dmp upx behavioral2/memory/5096-1-0x0000000010000000-0x0000000010014000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2612 5096 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3464 wrote to memory of 5096 3464 rundll32.exe 84 PID 3464 wrote to memory of 5096 3464 rundll32.exe 84 PID 3464 wrote to memory of 5096 3464 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96f2c8bca816cc30057f5ea61136121a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96f2c8bca816cc30057f5ea61136121a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5096 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 6243⤵
- Program crash
PID:2612
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5096 -ip 50961⤵PID:2244