Analysis
-
max time kernel
124s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:50
Static task
static1
Behavioral task
behavioral1
Sample
eab3d3a29582757e8e249e7e39656065_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab3d3a29582757e8e249e7e39656065_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eab3d3a29582757e8e249e7e39656065_JaffaCakes118.dll
-
Size
952KB
-
MD5
eab3d3a29582757e8e249e7e39656065
-
SHA1
09115213a6d94e5fa3a3fcfd7680dc3092ba5689
-
SHA256
95f96d848bdef5d0d410b6fa2b27f95cdf53a9c82192daff5915d18e3641cfbd
-
SHA512
ab25d538ee60f27f1e335c1a70f7a815c6a00195efb061b8a1ea2402d71f3a9b2f5dbc0ea2a661a84ca093a396e7496a94a4ce5fb4c446ba4137823ec6b2f8d5
-
SSDEEP
12288:oARt1rFbicAnX+JVOMJ8lMuZ9QyT/9YigeVVFki:oARthToMDu/Qi/9YiRVVFk
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2012 3008 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3688 wrote to memory of 3008 3688 rundll32.exe 89 PID 3688 wrote to memory of 3008 3688 rundll32.exe 89 PID 3688 wrote to memory of 3008 3688 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eab3d3a29582757e8e249e7e39656065_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eab3d3a29582757e8e249e7e39656065_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 6203⤵
- Program crash
PID:2012
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3008 -ip 30081⤵PID:4036
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4352,i,2727319350781907497,7925939240893079607,262144 --variations-seed-version --mojo-platform-channel-handle=3952 /prefetch:81⤵PID:760