Analysis
-
max time kernel
140s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 16:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b4244151165b14bf5df91cd9046aafad_JaffaCakes118.dll
Resource
win7-20240704-en
windows7-x64
5 signatures
150 seconds
General
-
Target
b4244151165b14bf5df91cd9046aafad_JaffaCakes118.dll
-
Size
429KB
-
MD5
b4244151165b14bf5df91cd9046aafad
-
SHA1
34fa5848b052603e350bb64a9cc015197d32d068
-
SHA256
d935c653803a8efd039fad751bd98d8bd0ac36259640cbe7bedaed9c1663bc90
-
SHA512
fa55333caf4ebd767b7196d753cbe357267b3db7dee4d527ccf7905d2873e59e52e57fd6b53aa613d28f520722dcbc90d57ae5ced80b17767741ebc4ddb88cb4
-
SSDEEP
12288:3wyC9lqNkv0cRZvLRQebhp80jWLjFa9e2J:+dNtFlO02jU9L
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3748-1-0x0000000002E20000-0x0000000002E57000-memory.dmp templ_dll -
Program crash 1 IoCs
pid pid_target Process procid_target 3968 3748 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2316 wrote to memory of 3748 2316 regsvr32.exe 84 PID 2316 wrote to memory of 3748 2316 regsvr32.exe 84 PID 2316 wrote to memory of 3748 2316 regsvr32.exe 84
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b4244151165b14bf5df91cd9046aafad_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b4244151165b14bf5df91cd9046aafad_JaffaCakes118.dll2⤵
- System Location Discovery: System Language Discovery
PID:3748 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3748 -s 6083⤵
- Program crash
PID:3968
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3748 -ip 37481⤵PID:3332