Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 01:47
Behavioral task
behavioral1
Sample
db99f89383ffc8192c5c8f375c1a9227_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db99f89383ffc8192c5c8f375c1a9227_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
db99f89383ffc8192c5c8f375c1a9227_JaffaCakes118.dll
-
Size
691KB
-
MD5
db99f89383ffc8192c5c8f375c1a9227
-
SHA1
9d9fc6cb0b26324c295e77b6b88bb54a555c1fd3
-
SHA256
4fbd1e224d6e46c20d8b22959699fea0bf3e5ea9a43de55d07fbad0d00a9e1b0
-
SHA512
e7575c5f1bf1877ba63c5e3a5711986e8a2723899463b730806b08ac76037d788ca1032edc534b802ae9b1b5cf2a48a572dbdb157f7fd82f8468e306333a3134
-
SSDEEP
12288:1gMNIDIBFs5VJGpFjqBDxPQU8/+SV9iztmLfGOTKaeF:1g8I8BSotqJx4p2rwLf5TKaeF
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2124 1708 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 580 wrote to memory of 1708 580 rundll32.exe 31 PID 580 wrote to memory of 1708 580 rundll32.exe 31 PID 580 wrote to memory of 1708 580 rundll32.exe 31 PID 580 wrote to memory of 1708 580 rundll32.exe 31 PID 580 wrote to memory of 1708 580 rundll32.exe 31 PID 580 wrote to memory of 1708 580 rundll32.exe 31 PID 580 wrote to memory of 1708 580 rundll32.exe 31 PID 1708 wrote to memory of 2124 1708 rundll32.exe 32 PID 1708 wrote to memory of 2124 1708 rundll32.exe 32 PID 1708 wrote to memory of 2124 1708 rundll32.exe 32 PID 1708 wrote to memory of 2124 1708 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db99f89383ffc8192c5c8f375c1a9227_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db99f89383ffc8192c5c8f375c1a9227_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1708 -s 2643⤵
- Program crash
PID:2124
-
-