Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 05:51 UTC
Static task
static1
Behavioral task
behavioral1
Sample
f9d5f637ccf75e5861fafc3e9f77b32b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9d5f637ccf75e5861fafc3e9f77b32b_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f9d5f637ccf75e5861fafc3e9f77b32b_JaffaCakes118.dll
-
Size
30KB
-
MD5
f9d5f637ccf75e5861fafc3e9f77b32b
-
SHA1
5fce85e77e5ae80fa863a4e4954e5bcbd990de96
-
SHA256
25f9e2ea825c6556f688bf1dfcf484c84a36f40f3eb125f5c1c0ade2b7e24a5e
-
SHA512
f54aa86daeac2d98102791477592e44739e9401bf784b8de3373c716159fb72eb4c3daf24db834caffb60647a2700bdbc27f97e3d2970fac219f91bbe0d32c77
-
SSDEEP
768:OdNqDzjop3BYhdTklOLRG6A0SRLP5kAVAuz:OdNqDnop3BYbT7Gr0+hf
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 724 224 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3524 wrote to memory of 224 3524 rundll32.exe 82 PID 3524 wrote to memory of 224 3524 rundll32.exe 82 PID 3524 wrote to memory of 224 3524 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9d5f637ccf75e5861fafc3e9f77b32b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f9d5f637ccf75e5861fafc3e9f77b32b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 5443⤵
- Program crash
PID:724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 224 -ip 2241⤵PID:2196
Network
-
Remote address:8.8.8.8:53Request217.106.137.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request76.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request228.249.119.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request197.87.175.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.31.95.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request98.117.19.2.in-addr.arpaIN PTRResponse98.117.19.2.in-addr.arpaIN PTRa2-19-117-98deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
73 B 147 B 1 1
DNS Request
217.106.137.52.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
76.32.126.40.in-addr.arpa
-
73 B 159 B 1 1
DNS Request
228.249.119.40.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
197.87.175.4.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
18.31.95.13.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
98.117.19.2.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa