Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2024, 09:43
Behavioral task
behavioral1
Sample
fe43bef8c46c7ea28a3708304bbb1ff6_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fe43bef8c46c7ea28a3708304bbb1ff6_JaffaCakes118.dll
Resource
win10v2004-20240910-en
General
-
Target
fe43bef8c46c7ea28a3708304bbb1ff6_JaffaCakes118.dll
-
Size
93KB
-
MD5
fe43bef8c46c7ea28a3708304bbb1ff6
-
SHA1
507822570a2dbc193371ec9a9c4ce19a5efb11a3
-
SHA256
f0f9ff21aad284c14547cfabe3821441a0715011998fd53f19c9816fe32cb856
-
SHA512
dce896798a07dba804008fa55eba126e5a01b442579974589b97fdebee45f0b6f373b0cb83076386914fc32e75cf3ca9113d3bc43e787384c0e94def4f91b4a8
-
SSDEEP
1536:y0srpIB43MDgR2MjPaOjoUGfNBYp4TThtx75woZZLtGT/CGBO2EuXXSHB+lEd00:yC48c2MjPVjgcg+sZLtGbCGuYi
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4696 3920 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2400 wrote to memory of 3920 2400 rundll32.exe 84 PID 2400 wrote to memory of 3920 2400 rundll32.exe 84 PID 2400 wrote to memory of 3920 2400 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe43bef8c46c7ea28a3708304bbb1ff6_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fe43bef8c46c7ea28a3708304bbb1ff6_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3920 -s 5403⤵
- Program crash
PID:4696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3920 -ip 39201⤵PID:1932