Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
dc401cc9d2680ec575947af57e827766_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dc401cc9d2680ec575947af57e827766_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
dc401cc9d2680ec575947af57e827766_JaffaCakes118.dll
-
Size
10KB
-
MD5
dc401cc9d2680ec575947af57e827766
-
SHA1
1a0e71ff5c01101f3ddb9360f8f556e8f12cf40b
-
SHA256
c565620b1d63378242587e05213032fee97b15fd821148772aace3af5b5cde41
-
SHA512
9fe521b49a23db7d5f07a4e91bfaae40523d2fdba8cb1324c5d660d52f56a96375c47ac3179315e44cb3a5a300784009db05866bbb5d79555e9e55c87d873e4c
-
SSDEEP
192:Fw8dHabRDEgtHyl0NSypWak6HVdW3yWak8QjdW3w9wv:ndHad/N20IypWak8dWiWak8EdWN
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2256 4160 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3144 wrote to memory of 4160 3144 rundll32.exe 83 PID 3144 wrote to memory of 4160 3144 rundll32.exe 83 PID 3144 wrote to memory of 4160 3144 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc401cc9d2680ec575947af57e827766_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc401cc9d2680ec575947af57e827766_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4160 -s 5483⤵
- Program crash
PID:2256
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 4160 -ip 41601⤵PID:3868