Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 05:55
Behavioral task
behavioral1
Sample
c2684b4dca9f198f845f0a228da378e0_JaffaCakes118.dll
Resource
win7-20240704-en
4 signatures
150 seconds
General
-
Target
c2684b4dca9f198f845f0a228da378e0_JaffaCakes118.dll
-
Size
20KB
-
MD5
c2684b4dca9f198f845f0a228da378e0
-
SHA1
1969e398021aa6f001528da93c7368e52afea169
-
SHA256
86c7394efbe9b24bfbcf12058c50bf0f82c6e960e04dac9ce908af1cb6f38455
-
SHA512
7f123700b12208ca789f7754083912c04cc0bb92a43fefc83330e35b0ddc75e303677eb2d73a80b4694d3e9d7467763651c84d0f9bb9176214b5ba7aaa8b4b3b
-
SSDEEP
384:fpwO4VvrAmdCJHbB9Ys5fpunEzO9bcUmObATfHot8S9ivOxkAET/+:74Jmb8aInEShclf7Hox9zEa
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2888-1-0x0000000010000000-0x0000000010012000-memory.dmp upx behavioral1/memory/2888-2-0x0000000010000000-0x0000000010012000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2912 2888 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2888 2396 rundll32.exe 30 PID 2396 wrote to memory of 2888 2396 rundll32.exe 30 PID 2396 wrote to memory of 2888 2396 rundll32.exe 30 PID 2396 wrote to memory of 2888 2396 rundll32.exe 30 PID 2396 wrote to memory of 2888 2396 rundll32.exe 30 PID 2396 wrote to memory of 2888 2396 rundll32.exe 30 PID 2396 wrote to memory of 2888 2396 rundll32.exe 30 PID 2888 wrote to memory of 2912 2888 rundll32.exe 31 PID 2888 wrote to memory of 2912 2888 rundll32.exe 31 PID 2888 wrote to memory of 2912 2888 rundll32.exe 31 PID 2888 wrote to memory of 2912 2888 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2684b4dca9f198f845f0a228da378e0_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2684b4dca9f198f845f0a228da378e0_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 2363⤵
- Program crash
PID:2912
-
-