Analysis
-
max time kernel
142s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
a404b189e0e84a6336854134b837fe3d_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a404b189e0e84a6336854134b837fe3d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a404b189e0e84a6336854134b837fe3d_JaffaCakes118.dll
-
Size
279KB
-
MD5
a404b189e0e84a6336854134b837fe3d
-
SHA1
d96e2b183b8e3181c45a9ed16d18b37a9bfc9f77
-
SHA256
ff55c89483e740946f1604f9d4a4710a795db97d302aab4aafb67e1c4cc7a417
-
SHA512
305f67458de0fea8204c28d931e433478066f918fc501abd52b5a12d1e89b58c4181672df216930264c649f43e3769bf610b7bb15d1307b4f17b8470ba09e866
-
SSDEEP
6144:DlgavXkUyI0WUlBkjqPaSB3V94A1Y6xQtsa74GzKlXgdiy:D5fTyB1tFH94R6x+sc41pgl
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2888 2436 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2436 rundll32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2436 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2436 2364 rundll32.exe 29 PID 2364 wrote to memory of 2436 2364 rundll32.exe 29 PID 2364 wrote to memory of 2436 2364 rundll32.exe 29 PID 2364 wrote to memory of 2436 2364 rundll32.exe 29 PID 2364 wrote to memory of 2436 2364 rundll32.exe 29 PID 2364 wrote to memory of 2436 2364 rundll32.exe 29 PID 2364 wrote to memory of 2436 2364 rundll32.exe 29 PID 2436 wrote to memory of 2888 2436 rundll32.exe 31 PID 2436 wrote to memory of 2888 2436 rundll32.exe 31 PID 2436 wrote to memory of 2888 2436 rundll32.exe 31 PID 2436 wrote to memory of 2888 2436 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a404b189e0e84a6336854134b837fe3d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a404b189e0e84a6336854134b837fe3d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2436 -s 2483⤵
- Program crash
PID:2888
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4641⤵PID:2212