Analysis
-
max time kernel
126s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 10:21
Behavioral task
behavioral1
Sample
ef964834e1aaedbf30843d520feb9b16_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef964834e1aaedbf30843d520feb9b16_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ef964834e1aaedbf30843d520feb9b16_JaffaCakes118.dll
-
Size
104KB
-
MD5
ef964834e1aaedbf30843d520feb9b16
-
SHA1
1958445d63b313513253dfdc88b17a73eb002838
-
SHA256
f2e74dcf7563360aeccd075cadbc98c696057e9ef5f4969f047a970766410f5a
-
SHA512
c7c22a2a1746243db0f89e772a51350248a491aa7cfd09308ce59d0ddd02d46a10d652aa92226347c20a45596606cce19e25d51c37c49c3c18914a3b1b12ab91
-
SSDEEP
1536:2GZcqO4GGA6951yahpSc3V2f8H89PYa+yTi6dki1z3d:tZsGA6P1XhkUVg8H8pd9Ti6dki1z3d
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4520 4948 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 740 wrote to memory of 4948 740 rundll32.exe 89 PID 740 wrote to memory of 4948 740 rundll32.exe 89 PID 740 wrote to memory of 4948 740 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef964834e1aaedbf30843d520feb9b16_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ef964834e1aaedbf30843d520feb9b16_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4948 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 6603⤵
- Program crash
PID:4520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4948 -ip 49481⤵PID:4516
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3808,i,3387628439405076340,17957358341235678872,262144 --variations-seed-version --mojo-platform-channel-handle=4100 /prefetch:81⤵PID:4284