Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 21:40
General
-
Target
0359e244c376b437e1eeb8f08bec2453_JaffaCakes118.dll
-
Size
184KB
-
MD5
0359e244c376b437e1eeb8f08bec2453
-
SHA1
a9fe0fd5de3a84231cff3b9b8e4b0271810bf97b
-
SHA256
e57bf10aa27aa97cb2330d0636d0f4a49eae4d93d5f808a143757eaea6a3ce0b
-
SHA512
5b93984d4a45a7ccca7c0d000f48a0a1c8d2a779b9b258f1e49cc65b7897681e1ce12749136b6c9d65eb6895fc8e25d44feb7de5a269539d0fbb3418c0314be6
-
SSDEEP
3072:hPWpwhHnB6p/emu2Gw+vi07FKp22PzTTffuBWPAhOlXifel9vL7TmECYaout37:lzKpbPk7MzffuQPAhOxl9faoS
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/3448-0-0x0000000000400000-0x0000000000457000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3996 3448 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3860 wrote to memory of 3448 3860 rundll32.exe 83 PID 3860 wrote to memory of 3448 3860 rundll32.exe 83 PID 3860 wrote to memory of 3448 3860 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0359e244c376b437e1eeb8f08bec2453_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0359e244c376b437e1eeb8f08bec2453_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 5403⤵
- Program crash
PID:3996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 3448 -ip 34481⤵PID:3136