Analysis
-
max time kernel
131s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 18:32
Behavioral task
behavioral1
Sample
c962be8bd701248f786082875b6b4d13_JaffaCakes118.dll
Resource
win7-20240705-en
5 signatures
150 seconds
General
-
Target
c962be8bd701248f786082875b6b4d13_JaffaCakes118.dll
-
Size
24KB
-
MD5
c962be8bd701248f786082875b6b4d13
-
SHA1
16343a5bebfb789333f549225a28b2c3890c77d4
-
SHA256
fbe6df5b0b479653b0fdbd90cf03ea14cf450d5cb1c96b94e10dd2d21bac8f76
-
SHA512
fcb3dfdc57fe5ee298e1b8bea6a417dc37abe1f69c50240162dd14200e264c979e779674805583df5cee5d33270b47ec87150025ac7b4430025c496920cecaaa
-
SSDEEP
384:MrLFPFwhONEfmwsDXALwdnLbgTzxdvvSgevo2M:MnxF4VNsiwdLbgR1vq
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4152-0-0x0000000000860000-0x000000000086F000-memory.dmp upx behavioral2/memory/4152-1-0x0000000000860000-0x000000000086F000-memory.dmp upx behavioral2/memory/4152-3-0x0000000000860000-0x000000000086F000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4948 4152 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4152 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4512 wrote to memory of 4152 4512 rundll32.exe 84 PID 4512 wrote to memory of 4152 4512 rundll32.exe 84 PID 4512 wrote to memory of 4152 4512 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c962be8bd701248f786082875b6b4d13_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c962be8bd701248f786082875b6b4d13_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4152 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4152 -s 6443⤵
- Program crash
PID:4948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4152 -ip 41521⤵PID:2072