Analysis
-
max time kernel
136s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 12:01
Behavioral task
behavioral1
Sample
b3616f34bb0acd0543c0ed31c9bc5812_JaffaCakes118.dll
Resource
win7-20240708-en
11 signatures
150 seconds
General
-
Target
b3616f34bb0acd0543c0ed31c9bc5812_JaffaCakes118.dll
-
Size
203KB
-
MD5
b3616f34bb0acd0543c0ed31c9bc5812
-
SHA1
f8e206cd83dd879e6b9fd99957fb3f3ba59e60de
-
SHA256
d6144364ea601a5f6048d21f47ea7591f4aa2640a965369c69d55e4433257161
-
SHA512
5595bf404e0e31e2e5d3810df971256e1f431a60a1fd7ef6e5ef0180621edda5ec83e4c9a094ce0f8ef55c0701f9df72180bdc474d9130e6f2f56af7af16a4c1
-
SSDEEP
6144:rDDj15kQqz4+2G783A6r1fcX2F+BXfm9psXUoS:3l52zn2C8ZB+BMsEoS
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3840-0-0x0000000000400000-0x0000000000465000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4536 3840 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1996 wrote to memory of 3840 1996 rundll32.exe 91 PID 1996 wrote to memory of 3840 1996 rundll32.exe 91 PID 1996 wrote to memory of 3840 1996 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3616f34bb0acd0543c0ed31c9bc5812_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b3616f34bb0acd0543c0ed31c9bc5812_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3840 -s 5603⤵
- Program crash
PID:4536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 3840 -ip 38401⤵PID:1964
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4072,i,1828333185976713750,7918646547767660928,262144 --variations-seed-version --mojo-platform-channel-handle=4384 /prefetch:81⤵PID:3856