Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22-08-2024 11:48
Static task
static1
Behavioral task
behavioral1
Sample
b782658906481b44a98cfe69f58c6876_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b782658906481b44a98cfe69f58c6876_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b782658906481b44a98cfe69f58c6876_JaffaCakes118.dll
-
Size
153KB
-
MD5
b782658906481b44a98cfe69f58c6876
-
SHA1
09a83ea9a8ece0102143461123c81b863706500d
-
SHA256
efc7150adc8a6a88314506a589f1f5704771254bfb7aa23a467f34fb36c13c15
-
SHA512
0bc9dd6a1fff39ade477a5c7389b2cfd9f1428f84aa6f4eff8bc6080e83984b276f6152d92df1493de19e05353ba9fb1c57fe9014ca9238b16f4a9d00dc944ea
-
SSDEEP
3072:J+qKioXJ0oKUI6YIJ4g5/IIOvtFLCGO8dfHzswCREPtTdQgaPL9Uv:J+BDqolYi+BTdfgdEPHT
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2696 1940 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2544 wrote to memory of 1940 2544 rundll32.exe 30 PID 2544 wrote to memory of 1940 2544 rundll32.exe 30 PID 2544 wrote to memory of 1940 2544 rundll32.exe 30 PID 2544 wrote to memory of 1940 2544 rundll32.exe 30 PID 2544 wrote to memory of 1940 2544 rundll32.exe 30 PID 2544 wrote to memory of 1940 2544 rundll32.exe 30 PID 2544 wrote to memory of 1940 2544 rundll32.exe 30 PID 1940 wrote to memory of 2696 1940 rundll32.exe 31 PID 1940 wrote to memory of 2696 1940 rundll32.exe 31 PID 1940 wrote to memory of 2696 1940 rundll32.exe 31 PID 1940 wrote to memory of 2696 1940 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b782658906481b44a98cfe69f58c6876_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b782658906481b44a98cfe69f58c6876_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 2403⤵
- Program crash
PID:2696
-
-