Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/09/2024, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
d298be8a1a1337d8a9529dc65c3f9ff3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d298be8a1a1337d8a9529dc65c3f9ff3_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d298be8a1a1337d8a9529dc65c3f9ff3_JaffaCakes118.dll
-
Size
906KB
-
MD5
d298be8a1a1337d8a9529dc65c3f9ff3
-
SHA1
9b3dba14a3a206cf4b1d04b91528aae2cbaebe72
-
SHA256
09757240d2048db7d12163f303a9a355c21f37a54ba66807bec891e714379fe4
-
SHA512
c5f40b5d16c9915aad79eb7058b84e6568af6b50bf5ce7b8a1c7e4685aed3940dbbdbfab856050960f39dbafe96f47a1e73f0452f2fdc39b50754a0cda779172
-
SSDEEP
24576:K7+O5AtyWO7Otd76AW+bN/WmQ+cLx8D3/WRjKww1:K7U9O/Lx8SRjKl1
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1692 2520 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 276 wrote to memory of 2520 276 rundll32.exe 31 PID 276 wrote to memory of 2520 276 rundll32.exe 31 PID 276 wrote to memory of 2520 276 rundll32.exe 31 PID 276 wrote to memory of 2520 276 rundll32.exe 31 PID 276 wrote to memory of 2520 276 rundll32.exe 31 PID 276 wrote to memory of 2520 276 rundll32.exe 31 PID 276 wrote to memory of 2520 276 rundll32.exe 31 PID 2520 wrote to memory of 1692 2520 rundll32.exe 32 PID 2520 wrote to memory of 1692 2520 rundll32.exe 32 PID 2520 wrote to memory of 1692 2520 rundll32.exe 32 PID 2520 wrote to memory of 1692 2520 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d298be8a1a1337d8a9529dc65c3f9ff3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d298be8a1a1337d8a9529dc65c3f9ff3_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 2643⤵
- Program crash
PID:1692
-
-