Analysis
-
max time kernel
132s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 15:19
Static task
static1
Behavioral task
behavioral1
Sample
d6954a7fb7aac9752cf8df7fad2821a4_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6954a7fb7aac9752cf8df7fad2821a4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
d6954a7fb7aac9752cf8df7fad2821a4_JaffaCakes118.dll
-
Size
235KB
-
MD5
d6954a7fb7aac9752cf8df7fad2821a4
-
SHA1
ccb1ee7d0fa55850a53fba4b17627cf272b775c9
-
SHA256
9581317b599470ec0ffbe22e2a9e6c0bef79e121bac548bf4a42f4655ffd1a7f
-
SHA512
3bdc9773c43d522de901c148c49e6ba9a5248ceb5dbdc51ac92de11bb747dea3bbdb09170af4b4dff596feebe07b91fa52cd51e4c46ca81cdcd0d42508bbacfe
-
SSDEEP
6144:5A5YJwiF5KgAqVUXGPYZfhU4Y/kml5r9rPpFXbvmVFdQVLivWsZt:y57iLKsYvU42bpz3mtrWsZt
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2704 3060 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3060 rundll32.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 3060 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1780 wrote to memory of 3060 1780 rundll32.exe 90 PID 1780 wrote to memory of 3060 1780 rundll32.exe 90 PID 1780 wrote to memory of 3060 1780 rundll32.exe 90
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6954a7fb7aac9752cf8df7fad2821a4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6954a7fb7aac9752cf8df7fad2821a4_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 12243⤵
- Program crash
PID:2704
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3060 -ip 30601⤵PID:4176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4360,i,7447299413640964517,4240724842020506306,262144 --variations-seed-version --mojo-platform-channel-handle=4404 /prefetch:81⤵PID:5064