Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 22:29
Behavioral task
behavioral1
Sample
037c50e36a0f32657ef0b6576fa3d402_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
11 signatures
150 seconds
General
-
Target
037c50e36a0f32657ef0b6576fa3d402_JaffaCakes118.dll
-
Size
181KB
-
MD5
037c50e36a0f32657ef0b6576fa3d402
-
SHA1
9db6c8b8a0bbf0322cff7603166c145b3a08e749
-
SHA256
c31b3f06253f118d155e726677d3eeec43c90660a8ebc29ef18a684c4ff43cdc
-
SHA512
6023c2599b7432d5e4f153f3bac426b2809b1e764f95133e2fafea25ee0660790a5f849e25e825a00e342ad74f4cf13c37f228b0dcef39f0af0b4e73096ace08
-
SSDEEP
3072:kiddDbazF4E6WqEDkejwSvtGiphKPNxQqxwCGiBn4C7Npa6dwTTjIACxjrx8ZGoz:fTDbazF4E6GDdt/hK1lHGipN8Y0Oxvx3
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3084-0-0x0000000000400000-0x0000000000450000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1984 3084 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4384 wrote to memory of 3084 4384 rundll32.exe 82 PID 4384 wrote to memory of 3084 4384 rundll32.exe 82 PID 4384 wrote to memory of 3084 4384 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\037c50e36a0f32657ef0b6576fa3d402_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\037c50e36a0f32657ef0b6576fa3d402_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3084 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3084 -s 5403⤵
- Program crash
PID:1984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3084 -ip 30841⤵PID:2716