Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26/08/2024, 08:29
Behavioral task
behavioral1
Sample
c2a09e56d9a8bb9c2ba382e1e50b7d38_JaffaCakes118.dll
Resource
win7-20240704-en
5 signatures
150 seconds
General
-
Target
c2a09e56d9a8bb9c2ba382e1e50b7d38_JaffaCakes118.dll
-
Size
217KB
-
MD5
c2a09e56d9a8bb9c2ba382e1e50b7d38
-
SHA1
092156f276050999de184c86cee6860862c4749a
-
SHA256
3bea104b90310d1dfdf60d01d5f1dccb3549b3c8b5e61c859087255a96e0c118
-
SHA512
2b9c54e15fec84f5bd9796996cf1b6dd867ec01da1431f8203784cecc01b45986eb491da3244faacb93a193c855d5057349e360eaa71c7e7501b1c89d3d4bb62
-
SSDEEP
6144:/qMmee6ICfPQAX5/6HVtDA6ZZ61S5CkxLF:iMSbCfIHkUs1SFxLF
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2160-3-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2160-2-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2160-1-0x0000000010000000-0x0000000010038000-memory.dmp upx behavioral1/memory/2160-4-0x0000000010000000-0x0000000010038000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1952 2160 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2160 rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2160 2776 rundll32.exe 30 PID 2776 wrote to memory of 2160 2776 rundll32.exe 30 PID 2776 wrote to memory of 2160 2776 rundll32.exe 30 PID 2776 wrote to memory of 2160 2776 rundll32.exe 30 PID 2776 wrote to memory of 2160 2776 rundll32.exe 30 PID 2776 wrote to memory of 2160 2776 rundll32.exe 30 PID 2776 wrote to memory of 2160 2776 rundll32.exe 30 PID 2160 wrote to memory of 1952 2160 rundll32.exe 31 PID 2160 wrote to memory of 1952 2160 rundll32.exe 31 PID 2160 wrote to memory of 1952 2160 rundll32.exe 31 PID 2160 wrote to memory of 1952 2160 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2a09e56d9a8bb9c2ba382e1e50b7d38_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c2a09e56d9a8bb9c2ba382e1e50b7d38_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 2523⤵
- Program crash
PID:1952
-
-