Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
a900d706d270bc92d26125faf4072a4f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a900d706d270bc92d26125faf4072a4f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
a900d706d270bc92d26125faf4072a4f_JaffaCakes118.dll
-
Size
691KB
-
MD5
a900d706d270bc92d26125faf4072a4f
-
SHA1
17d789622dd11010757c25c0a5261641f788cd97
-
SHA256
b530ce456b05f671094ee594a70d02f394f096d401869672dc1ee6449f40e92d
-
SHA512
b0bff69bdd37f654999a03356d54bcb2ed33fba5dd7fad0156fffbc8d7ec1c875594756455d18bcb7658ebcda5ab8f1edc938fdb96d2c5dd098470a925ba1e33
-
SSDEEP
12288:6TosEORtveLq+7BptoFvX++y2/0AgmVJJXJOUA6ADpuP8ul:IRLeW+7BptoNR/0oVJJXJOUA6ADpu
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2724 2624 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2624 2660 rundll32.exe 31 PID 2660 wrote to memory of 2624 2660 rundll32.exe 31 PID 2660 wrote to memory of 2624 2660 rundll32.exe 31 PID 2660 wrote to memory of 2624 2660 rundll32.exe 31 PID 2660 wrote to memory of 2624 2660 rundll32.exe 31 PID 2660 wrote to memory of 2624 2660 rundll32.exe 31 PID 2660 wrote to memory of 2624 2660 rundll32.exe 31 PID 2624 wrote to memory of 2724 2624 rundll32.exe 32 PID 2624 wrote to memory of 2724 2624 rundll32.exe 32 PID 2624 wrote to memory of 2724 2624 rundll32.exe 32 PID 2624 wrote to memory of 2724 2624 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a900d706d270bc92d26125faf4072a4f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a900d706d270bc92d26125faf4072a4f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 2803⤵
- Program crash
PID:2724
-
-