Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-08-2024 02:46
Static task
static1
Behavioral task
behavioral1
Sample
98a4496b6ba500b3bf0a4df0dc48f79c_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
98a4496b6ba500b3bf0a4df0dc48f79c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/iewybf.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/iewybf.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/iewybf.dll
-
Size
29KB
-
MD5
4256ddc7ba4f2ab39fb28f081e870cfa
-
SHA1
8c1f0f6e94b68510bbffbf81143c5f26ebd913b6
-
SHA256
d519f718eca42250c87657b679a8a9d1766d331e6ee242d18bd739998bf44350
-
SHA512
a71ac74ad9d95c6b755858b0a75beaa3ec26e20eca252445a2d1541156d96bd39e39c30daa5eda28bafe8de2e2d67c2c70b25dce6b7f38f4ac0a0dfa60599c1a
-
SSDEEP
768:ubYYsBQJDh7wN4Ce10NUW5gPO8P9MOVAiTtm/MNJ:+IBQJDPGgPO8P9vAVm
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4620 60 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2880 wrote to memory of 60 2880 rundll32.exe 84 PID 2880 wrote to memory of 60 2880 rundll32.exe 84 PID 2880 wrote to memory of 60 2880 rundll32.exe 84 PID 60 wrote to memory of 3596 60 rundll32.exe 87 PID 60 wrote to memory of 3596 60 rundll32.exe 87 PID 60 wrote to memory of 3596 60 rundll32.exe 87 PID 60 wrote to memory of 3596 60 rundll32.exe 87
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\iewybf.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\iewybf.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\iewybf.dll,#13⤵PID:3596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 60 -s 7283⤵
- Program crash
PID:4620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 60 -ip 601⤵PID:3664