Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:43
Static task
static1
Behavioral task
behavioral1
Sample
ea8598edd10b189ff6ab578ea642ca0f_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea8598edd10b189ff6ab578ea642ca0f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ea8598edd10b189ff6ab578ea642ca0f_JaffaCakes118.dll
-
Size
59KB
-
MD5
ea8598edd10b189ff6ab578ea642ca0f
-
SHA1
25604a47974d650a1b2fb4b91260e28da5cf8a5a
-
SHA256
552866e237b765081d9c282071e88739abce4ffc58e0d9c50e2acbafd0d5dc52
-
SHA512
3457c10a6a75ab44e48d1805b1fce75ea98f3c24360e8018ba54203f0f4b8fd535d2af9d98fbca875385c993c3c61e90484850b372b9b8e860f32dda61107b8b
-
SSDEEP
768:NzvcQo85dXkMF8sFcDvcuePmQElBPVMKffJ79z/UrKl4tPXGWgUYg3l:ZVo8bXkMPidexElh3fJ79z/rCJ2a3l
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4632 2588 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2588 1920 rundll32.exe 82 PID 1920 wrote to memory of 2588 1920 rundll32.exe 82 PID 1920 wrote to memory of 2588 1920 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea8598edd10b189ff6ab578ea642ca0f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ea8598edd10b189ff6ab578ea642ca0f_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 6203⤵
- Program crash
PID:4632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2588 -ip 25881⤵PID:1592