Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 00:19
Static task
static1
Behavioral task
behavioral1
Sample
ea3d9ed4740f9b21141f8cc0094afeb9_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea3d9ed4740f9b21141f8cc0094afeb9_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ea3d9ed4740f9b21141f8cc0094afeb9_JaffaCakes118.dll
-
Size
58KB
-
MD5
ea3d9ed4740f9b21141f8cc0094afeb9
-
SHA1
81b7b532cc680ecc796cd9402d369a303aa59bad
-
SHA256
3c0d5710dd0e07972a6134dc260a0d4544582f134d0f5049d91375a0094bed0f
-
SHA512
1a910bfb3238a712c333966ec7fad82c08aae13e599b18853b173ab3435383887d3be477e55057a87ba25273b1d141ea80928f95ead86afcca66ab2dbaa7d99d
-
SSDEEP
1536:F7hligalhWrS5jyDoIWKfycLRccbWEt09Zfad8XE:Fd/af7I5gK0nXE
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1496 2300 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 412 wrote to memory of 2300 412 rundll32.exe 82 PID 412 wrote to memory of 2300 412 rundll32.exe 82 PID 412 wrote to memory of 2300 412 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea3d9ed4740f9b21141f8cc0094afeb9_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea3d9ed4740f9b21141f8cc0094afeb9_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2300 -s 5603⤵
- Program crash
PID:1496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2300 -ip 23001⤵PID:1512