Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 02:11
Static task
static1
Behavioral task
behavioral1
Sample
ad808ab20c0a1e9047346e93ed127e54_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ad808ab20c0a1e9047346e93ed127e54_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ad808ab20c0a1e9047346e93ed127e54_JaffaCakes118.dll
-
Size
64KB
-
MD5
ad808ab20c0a1e9047346e93ed127e54
-
SHA1
d0884e0b4d58b8c05db3b192e5966aff45a2e0e0
-
SHA256
d2eb30037a70c0f2e34547a518cef33803969a36842663fba48451e28a920f54
-
SHA512
7deb11c66ee8c672d977b6e583da175ba0dbe98b9ca8be056b9fbfa95da68bc2e152becd94e9893ab67e788fd98faff4b76a225a5c2435dc2f49d1943be6fe9b
-
SSDEEP
768:dKYRJa9FVGQsJsHGrydM35K5SdlFRb1I3H1tpUGdZAhNbNeX+SSheNsF9y4fVIZg:nvanQQsJIQB3CW51u/5qB3oY9Ag
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2708 2700 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2700 1972 rundll32.exe 30 PID 1972 wrote to memory of 2700 1972 rundll32.exe 30 PID 1972 wrote to memory of 2700 1972 rundll32.exe 30 PID 1972 wrote to memory of 2700 1972 rundll32.exe 30 PID 1972 wrote to memory of 2700 1972 rundll32.exe 30 PID 1972 wrote to memory of 2700 1972 rundll32.exe 30 PID 1972 wrote to memory of 2700 1972 rundll32.exe 30 PID 2700 wrote to memory of 2708 2700 rundll32.exe 31 PID 2700 wrote to memory of 2708 2700 rundll32.exe 31 PID 2700 wrote to memory of 2708 2700 rundll32.exe 31 PID 2700 wrote to memory of 2708 2700 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad808ab20c0a1e9047346e93ed127e54_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ad808ab20c0a1e9047346e93ed127e54_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 2683⤵
- Program crash
PID:2708
-
-