Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 07:20
Static task
static1
Behavioral task
behavioral1
Sample
d5db54ed73ad084aab84e1d2b948197c_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d5db54ed73ad084aab84e1d2b948197c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d5db54ed73ad084aab84e1d2b948197c_JaffaCakes118.dll
-
Size
45KB
-
MD5
d5db54ed73ad084aab84e1d2b948197c
-
SHA1
859cbccb9b5469e5be102456a670c6eeb4f82976
-
SHA256
64008777902d977b1aea5717215d8ce42e0c58765354b4e9a359508a5677a152
-
SHA512
ddb8f70dff56d36c0b27cbb80aa6849ae165b43acdc86d1b79d47adc8a8557dd6cde74c88e7b74e7ecb52321e8520c5c35a4e0b994f375b637afc0486a5b5edb
-
SSDEEP
768:O2RI72noV3/QtjX4KHr9fZQ3LGOHQnjIQkmAJG20s6n/MH7U6:ploV3/W39fZc1HQn0HAAb
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4112 5108 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4824 wrote to memory of 5108 4824 rundll32.exe 85 PID 4824 wrote to memory of 5108 4824 rundll32.exe 85 PID 4824 wrote to memory of 5108 4824 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5db54ed73ad084aab84e1d2b948197c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d5db54ed73ad084aab84e1d2b948197c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:5108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5108 -s 5843⤵
- Program crash
PID:4112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 5108 -ip 51081⤵PID:4644