Analysis
-
max time kernel
131s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
c073fe04d18c7d62a7a24369ac665cf3_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c073fe04d18c7d62a7a24369ac665cf3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c073fe04d18c7d62a7a24369ac665cf3_JaffaCakes118.dll
-
Size
56KB
-
MD5
c073fe04d18c7d62a7a24369ac665cf3
-
SHA1
289f9d8f73084620546a3a8fdace1b170b147121
-
SHA256
6db198810e784b9cd83a284fa9064bd59b611a64a6ae43ad2328e63c0266c5e2
-
SHA512
b1e0161b0f78feae9d64337ad8e3a9364a9e139653b5b85b75ae3217611107277b070f76e0ed8b2295aa046c2c3bcac036dfbf519a0a0b4b4ba31444fa6029f4
-
SSDEEP
1536:+fQAl+7ovOCyjF4wKWoySvgRoabmITNrBtrrtdT1Av6mjMIlo:aQAl+p54wNB+gRongBRpdiv6mXlo
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3448 1016 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3208 wrote to memory of 1016 3208 rundll32.exe 89 PID 3208 wrote to memory of 1016 3208 rundll32.exe 89 PID 3208 wrote to memory of 1016 3208 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c073fe04d18c7d62a7a24369ac665cf3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c073fe04d18c7d62a7a24369ac665cf3_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1016 -s 5683⤵
- Program crash
PID:3448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1016 -ip 10161⤵PID:2040
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3036,i,11251706013556949551,5157034131170452377,262144 --variations-seed-version --mojo-platform-channel-handle=4252 /prefetch:81⤵PID:1704