Analysis
-
max time kernel
141s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 22:57
Static task
static1
Behavioral task
behavioral1
Sample
a47ae5e0abb48708b2337aaaeece0842_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a47ae5e0abb48708b2337aaaeece0842_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a47ae5e0abb48708b2337aaaeece0842_JaffaCakes118.dll
-
Size
866KB
-
MD5
a47ae5e0abb48708b2337aaaeece0842
-
SHA1
1f0de92260bc518c82425664bb876a556ee353cf
-
SHA256
8777d9ee52306cbdcd33629f919bff3f9985f2b393fb7d32467943ab777f605e
-
SHA512
4b8fb6d7f66f3ecb75cc4d8c2f252528076ff602719ccbe2ab8e63aef6e88f1cc9b8483caab97405bebbd914747ec32b28f0b40eb8ddb4737261b8fa9db035c8
-
SSDEEP
24576:DSt78g28+xsaIxRwOKx1c3FvUIXepWmQnZuKvXqmGraWmAh:Uaxsk0LZBvXlM
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3060 1864 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1864 1640 rundll32.exe 30 PID 1640 wrote to memory of 1864 1640 rundll32.exe 30 PID 1640 wrote to memory of 1864 1640 rundll32.exe 30 PID 1640 wrote to memory of 1864 1640 rundll32.exe 30 PID 1640 wrote to memory of 1864 1640 rundll32.exe 30 PID 1640 wrote to memory of 1864 1640 rundll32.exe 30 PID 1640 wrote to memory of 1864 1640 rundll32.exe 30 PID 1864 wrote to memory of 3060 1864 rundll32.exe 31 PID 1864 wrote to memory of 3060 1864 rundll32.exe 31 PID 1864 wrote to memory of 3060 1864 rundll32.exe 31 PID 1864 wrote to memory of 3060 1864 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a47ae5e0abb48708b2337aaaeece0842_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a47ae5e0abb48708b2337aaaeece0842_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 2643⤵
- Program crash
PID:3060
-
-