Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 23:25
Static task
static1
Behavioral task
behavioral1
Sample
d547bfabb29f7d3c72ed2ad2feda469c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d547bfabb29f7d3c72ed2ad2feda469c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d547bfabb29f7d3c72ed2ad2feda469c_JaffaCakes118.dll
-
Size
71KB
-
MD5
d547bfabb29f7d3c72ed2ad2feda469c
-
SHA1
8d3716e8d38217b03b6cebb00b3a092289215f3c
-
SHA256
3629f98f7e2610c6d20bb0cca183f80e4599f64279b1a1867c8939a568112a15
-
SHA512
07a24a40928ef3ccb0374990505275e9be6cc52a49de4273ea283e53ecf89fad86b96e4209fffe80fa7afcabed561f6edaa59ae0385dc3aebfc6ee0466006fd5
-
SSDEEP
768:HkSpisvuzgdwMG9hl7c1M5uEcnZ99AOLp38/JpPPmNbHtPUhpiOK3n4LZ:ESplSbm1rtAO1MvXmN7tP8iOK3n4
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2016 584 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 604 wrote to memory of 584 604 rundll32.exe 31 PID 604 wrote to memory of 584 604 rundll32.exe 31 PID 604 wrote to memory of 584 604 rundll32.exe 31 PID 604 wrote to memory of 584 604 rundll32.exe 31 PID 604 wrote to memory of 584 604 rundll32.exe 31 PID 604 wrote to memory of 584 604 rundll32.exe 31 PID 604 wrote to memory of 584 604 rundll32.exe 31 PID 584 wrote to memory of 2016 584 rundll32.exe 32 PID 584 wrote to memory of 2016 584 rundll32.exe 32 PID 584 wrote to memory of 2016 584 rundll32.exe 32 PID 584 wrote to memory of 2016 584 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d547bfabb29f7d3c72ed2ad2feda469c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d547bfabb29f7d3c72ed2ad2feda469c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 584 -s 2243⤵
- Program crash
PID:2016
-
-