Analysis
-
max time kernel
133s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 17:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b44962368a27fbb118aa3accad6e1b33_JaffaCakes118.dll
Resource
win7-20240708-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
b44962368a27fbb118aa3accad6e1b33_JaffaCakes118.dll
Resource
win10v2004-20240802-en
windows10-2004-x64
3 signatures
150 seconds
General
-
Target
b44962368a27fbb118aa3accad6e1b33_JaffaCakes118.dll
-
Size
2KB
-
MD5
b44962368a27fbb118aa3accad6e1b33
-
SHA1
ea13095640cc6f809348eb6426476f6f33fffaae
-
SHA256
a499f93082dce9e00c61dc42f90b93134177ab246edd1bf81e874fd2f33f18fe
-
SHA512
5cf4d4e5a91604aa7664fab33594cca090e40e0880dcc2c1dfbd4b31437927e6dedc7c74d62c24104efc8ceae702144af910ead54178d530b7313f44509e235e
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1672 4840 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2208 wrote to memory of 4840 2208 rundll32.exe 84 PID 2208 wrote to memory of 4840 2208 rundll32.exe 84 PID 2208 wrote to memory of 4840 2208 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b44962368a27fbb118aa3accad6e1b33_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b44962368a27fbb118aa3accad6e1b33_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 5403⤵
- Program crash
PID:1672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 4840 -ip 48401⤵PID:3516