Analysis
-
max time kernel
142s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 15:32
Behavioral task
behavioral1
Sample
ab904d2b5e4137718bf687faabb8d38a_JaffaCakes118.dll
Resource
win7-20240705-en
windows7-x64
5 signatures
150 seconds
General
-
Target
ab904d2b5e4137718bf687faabb8d38a_JaffaCakes118.dll
-
Size
124KB
-
MD5
ab904d2b5e4137718bf687faabb8d38a
-
SHA1
4be6e2c8a05e07e17054ef42d1dd9b9677e4ae66
-
SHA256
e34dec0961e542df196caa76635f8af2886a9125c2ea71609022b9a48bc09828
-
SHA512
03f933423dfd23afe6b92d8c79d5d78ec283fd2b0671233cc82a1adfdde3137916a1586bd9b3430899fa81ff1460f9e2278e7f4c84ae74de60bb0196fbb2d781
-
SSDEEP
3072:88JY50gePA/UHM/7XGxGa+fBgdnUoSYVSqeD9N7hB3Z:L1PY82GxTGgxXSaSqcphFZ
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/memory/3780-0-0x0000000010000000-0x0000000010020000-memory.dmp family_gh0strat -
Program crash 1 IoCs
pid pid_target Process procid_target 2964 3780 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3460 wrote to memory of 3780 3460 rundll32.exe 91 PID 3460 wrote to memory of 3780 3460 rundll32.exe 91 PID 3460 wrote to memory of 3780 3460 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab904d2b5e4137718bf687faabb8d38a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ab904d2b5e4137718bf687faabb8d38a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 6323⤵
- Program crash
PID:2964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 3780 -ip 37801⤵PID:4260
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4616,i,15336851255456239337,16379811035920490645,262144 --variations-seed-version --mojo-platform-channel-handle=3768 /prefetch:81⤵PID:1624