Analysis
-
max time kernel
132s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 21:26
Static task
static1
Behavioral task
behavioral1
Sample
b51a4121f6dd8a33e7791c110ca948bb_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b51a4121f6dd8a33e7791c110ca948bb_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b51a4121f6dd8a33e7791c110ca948bb_JaffaCakes118.dll
-
Size
118KB
-
MD5
b51a4121f6dd8a33e7791c110ca948bb
-
SHA1
7568011846c06f8da8939692993741f7d1d9d392
-
SHA256
19ffd11b2e515d37baad1cc66d921ea99e231c8dd63cd75368fa9d433a7cdf3f
-
SHA512
74f845a9936543db6deaa4c3ef5441a035631d11c1fafbded1773491e0e712590ca1c42915480fc89db502b0951f53a81d1e7d95ce5ba3c5eb8b7a9356503798
-
SSDEEP
1536:NV0THR5RFdvCjdsshCmPn/7T7vGJ0aHCYMXUIawSaIHlEcpu66vN9xkc0DW+tPDT:NV0TntosFg/7fGJ0aHlMkvgIFpmv9w
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\23lldnur.pad rundll32.exe File opened for modification C:\PROGRA~3\23lldnur.pad rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3696 2964 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3336 wrote to memory of 2964 3336 rundll32.exe 85 PID 3336 wrote to memory of 2964 3336 rundll32.exe 85 PID 3336 wrote to memory of 2964 3336 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b51a4121f6dd8a33e7791c110ca948bb_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b51a4121f6dd8a33e7791c110ca948bb_JaffaCakes118.dll,#12⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2964 -s 8363⤵
- Program crash
PID:3696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2964 -ip 29641⤵PID:808