Analysis
-
max time kernel
91s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 04:52
Static task
static1
Behavioral task
behavioral1
Sample
ea9ef81a997fbe12d5af12d4ec16cda2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ea9ef81a997fbe12d5af12d4ec16cda2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Convert.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Convert.dll
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/Convert.dll
-
Size
114KB
-
MD5
00321d477f76e401373c1fc71c7c4502
-
SHA1
cb010222cb25d67810f46d20c4daffea60b86c6e
-
SHA256
48db77073c6ab1ab2a0f0d80a21d1a17bee5ed745735b2a780b137bf06681c43
-
SHA512
6974617a9482b08f41db8575e123f82d76c18ae8dc2aae605b6d3bee0dce52f55de061283ca4c3eb0579eeaa0261f09cb98c611b0b5d502b37b3169e0bba4f85
-
SSDEEP
1536:Pwh1R1Rl8FMOXu6BbIXkCDPoxBWPa1IPHTTfmfiHF6nF6zAWrTkDBO:SbCMOXrKUtW1LjmfgFCF4AWrTOBO
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1264 1540 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3612 wrote to memory of 1540 3612 rundll32.exe 84 PID 3612 wrote to memory of 1540 3612 rundll32.exe 84 PID 3612 wrote to memory of 1540 3612 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Convert.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Convert.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 6003⤵
- Program crash
PID:1264
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1540 -ip 15401⤵PID:4144