Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 04:56
Static task
static1
Behavioral task
behavioral1
Sample
eaa031965252e3238e2dfb4a60ca9825_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaa031965252e3238e2dfb4a60ca9825_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eaa031965252e3238e2dfb4a60ca9825_JaffaCakes118.dll
-
Size
265KB
-
MD5
eaa031965252e3238e2dfb4a60ca9825
-
SHA1
864715160e77e3e3ed5cb5329f9ba70528d60085
-
SHA256
4d8b2f8a79c3757e9b8e810c6e24baa1219204bfc71d48d400ed94c36648298e
-
SHA512
c69bbf2108f7b12f1189296b89734e1dc4590e37f51b9648a7cf26e2ccb9899dcacc11d4268c9962d9ba1ba4a7486d8869df792671bb2743793b6d7d8898321e
-
SSDEEP
6144:ZdQRPilVpFainJUbTc8yCqafKNw4pYn44Xv6Lw5bVhTV8BPXn:Z+2a/cNC5cKxpHTVePXn
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1544 844 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 768 wrote to memory of 844 768 rundll32.exe 81 PID 768 wrote to memory of 844 768 rundll32.exe 81 PID 768 wrote to memory of 844 768 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eaa031965252e3238e2dfb4a60ca9825_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eaa031965252e3238e2dfb4a60ca9825_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:844 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 844 -s 6323⤵
- Program crash
PID:1544
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 844 -ip 8441⤵PID:4344