Analysis
-
max time kernel
133s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 07:46
Static task
static1
Behavioral task
behavioral1
Sample
aa2b64d0f4297fef01844731993d096e_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
aa2b64d0f4297fef01844731993d096e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
aa2b64d0f4297fef01844731993d096e_JaffaCakes118.dll
-
Size
74KB
-
MD5
aa2b64d0f4297fef01844731993d096e
-
SHA1
8dce22e76e72fc0081831ea753991d2ebeb91f5e
-
SHA256
9fd33561c13ce94c7f0c758df785b4132dfcb44954b4db61682d0b784d520445
-
SHA512
e1cb9d0f173ddccebc2b3e6a3dbb6acda044041a5f7bbcab52761e196e43d0e146ee1e5fd4be0b26588f2d0abe7c337c590d06da17dd0f925146240891be880b
-
SSDEEP
1536:RvgCtfx/spx3KD5Vs7OQp7Asqvr9qCrcgkuX:1gCDsbZpGT9ftX
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3664 2032 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4284 wrote to memory of 2032 4284 rundll32.exe 90 PID 4284 wrote to memory of 2032 4284 rundll32.exe 90 PID 4284 wrote to memory of 2032 4284 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aa2b64d0f4297fef01844731993d096e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aa2b64d0f4297fef01844731993d096e_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 6243⤵
- Program crash
PID:3664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 2032 -ip 20321⤵PID:2592
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4152,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4316 /prefetch:81⤵PID:3840