Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
df31a8675f4cd60ce1381a98cbc4530d_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df31a8675f4cd60ce1381a98cbc4530d_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
df31a8675f4cd60ce1381a98cbc4530d_JaffaCakes118.dll
-
Size
37KB
-
MD5
df31a8675f4cd60ce1381a98cbc4530d
-
SHA1
bd0b1cb45287726a1deb8979d75c0122d9280e20
-
SHA256
fdba0c818bc45895ade285609b46c6f23dac36d471a702c088048b31dfd082c5
-
SHA512
0d06b400ec2e287b37e86f887c0b4e9e055cf4720dea2ea1727886b7bdb21ebb089c724e2303a7bccb5d6b3806aea431d747313c3bc3aec6366cf3514509d8af
-
SSDEEP
768:K6wH/EmJ1Ui+rE89cvBWvY5UxApkiRlqUQ/F6ofGCm:K6wH/VTF8O5kAeiyUQ6v
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4760 4856 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1684 wrote to memory of 4856 1684 rundll32.exe 83 PID 1684 wrote to memory of 4856 1684 rundll32.exe 83 PID 1684 wrote to memory of 4856 1684 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df31a8675f4cd60ce1381a98cbc4530d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\df31a8675f4cd60ce1381a98cbc4530d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 5923⤵
- Program crash
PID:4760
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4856 -ip 48561⤵PID:3392