Analysis
-
max time kernel
94s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 08:32
Static task
static1
Behavioral task
behavioral1
Sample
eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
eaf34a7d9a24baf248e4b5da247a384e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
SFhelper.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
SFhelper.dll
Resource
win10v2004-20240802-en
General
-
Target
SFhelper.dll
-
Size
90KB
-
MD5
05fc8bccccdabed0243488f3d7a30a75
-
SHA1
dfafc4da35a1182e7e1f5d4f32e6d600482b8a13
-
SHA256
ff553449b2d4b769a25b8b6c639d8b5d962ddce24b4601a1bff41b8fc7697376
-
SHA512
e326ef5f312c9a3c2ff7e09fc276e4b14aebfe17563ae44e47f7184b8c0dc9ac89f78d56e785b099e897945871a7dcd04747c0cd457128bca539baeca388f968
-
SSDEEP
1536:21Y63GYd+/TMY5IznqfilmW8otkKCt7Ab3VLXONAQ5M89CLqudzfiGkGmDkrwJVb:2t2Yd+/1ilH8ALlLX6AWDTudrXrUuWr
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4736 set thread context of 4060 4736 rundll32.exe 83 -
Program crash 1 IoCs
pid pid_target Process procid_target 3640 4060 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3116 wrote to memory of 4736 3116 rundll32.exe 82 PID 3116 wrote to memory of 4736 3116 rundll32.exe 82 PID 3116 wrote to memory of 4736 3116 rundll32.exe 82 PID 4736 wrote to memory of 4060 4736 rundll32.exe 83 PID 4736 wrote to memory of 4060 4736 rundll32.exe 83 PID 4736 wrote to memory of 4060 4736 rundll32.exe 83 PID 4736 wrote to memory of 4060 4736 rundll32.exe 83 PID 4736 wrote to memory of 4060 4736 rundll32.exe 83 PID 4736 wrote to memory of 4060 4736 rundll32.exe 83 PID 4736 wrote to memory of 4060 4736 rundll32.exe 83 PID 4736 wrote to memory of 4060 4736 rundll32.exe 83 PID 4736 wrote to memory of 4060 4736 rundll32.exe 83 PID 4736 wrote to memory of 4060 4736 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SFhelper.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SFhelper.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\SFhelper.dll,#13⤵PID:4060
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 124⤵
- Program crash
PID:3640
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4060 -ip 40601⤵PID:2432