Analysis
-
max time kernel
121s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 18:33
Static task
static1
Behavioral task
behavioral1
Sample
d033c04fe1362e4b6a51cca132b33b69_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d033c04fe1362e4b6a51cca132b33b69_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/inetc.dll
-
Size
18KB
-
MD5
7e8c44d48abc8389870315f31f57731e
-
SHA1
333104e3bb8f146392fa75ab5ca9eddc363d5ec8
-
SHA256
dc44fa2f73c1836f595812c0a878ef90f360c6baeea081987579eb8eb3dd281d
-
SHA512
3fd1e736e98b34e2f32a5c1d925063c67b96baff05782dcdd70d59dd31c87aac51b63d8d6651d6b5f2e66f530ad9260618b425d7207d3d62aa695329eaa7b97e
-
SSDEEP
384:6m63fDhscIjBEQ/5UVGTwlIigkYW/1Uya9zI0Ac9khYLMkIX0+GaBg:6BsccBEksWwlI9Z+Da9z
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3376 3364 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 828 wrote to memory of 3364 828 rundll32.exe 83 PID 828 wrote to memory of 3364 828 rundll32.exe 83 PID 828 wrote to memory of 3364 828 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\inetc.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\inetc.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 6243⤵
- Program crash
PID:3376
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3364 -ip 33641⤵PID:336