Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:51
Static task
static1
Behavioral task
behavioral1
Sample
eab42b86f1449a37738bf0755ff4ddfa_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eab42b86f1449a37738bf0755ff4ddfa_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
eab42b86f1449a37738bf0755ff4ddfa_JaffaCakes118.dll
-
Size
92KB
-
MD5
eab42b86f1449a37738bf0755ff4ddfa
-
SHA1
bf59cf3d5a9a5f631aaf108162a15a1e9708f9b7
-
SHA256
b2f20c05f78f92702bbc9850279fc56d12ae63945960ed23d4b6e1a18bc234c6
-
SHA512
dbdc55e001526811e9b7f77a26905bb4efa1d73f985539ba827b3c12fe99a00737050c47815442aff1cc3e5aff68d0172c83ddcfcf2ee4d0ea28b6bc080c245e
-
SSDEEP
1536:W7aOGTcvRbdidd317YaTzsMkxqKQSARSbLXCLwfisczze7uHL6/DlLF:WOO/GdF7Av0t8bjCQjcXouO7lLF
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4560 3864 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4104 wrote to memory of 3864 4104 rundll32.exe 82 PID 4104 wrote to memory of 3864 4104 rundll32.exe 82 PID 4104 wrote to memory of 3864 4104 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eab42b86f1449a37738bf0755ff4ddfa_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\eab42b86f1449a37738bf0755ff4ddfa_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3864 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3864 -s 5443⤵
- Program crash
PID:4560
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3864 -ip 38641⤵PID:3684