Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
03faa453852e32b85d1cdba0bd860cb5_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03faa453852e32b85d1cdba0bd860cb5_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
03faa453852e32b85d1cdba0bd860cb5_JaffaCakes118.dll
-
Size
67KB
-
MD5
03faa453852e32b85d1cdba0bd860cb5
-
SHA1
753116e502b344fa483e1da7db0389dab492a126
-
SHA256
b3ca84fc5e8c6293b19b84238de5e7b3548c23014b4cabf0ed59b98c79c10496
-
SHA512
aa2702be016fc9aeab4f3256d5de7717d561c4e7897d827f3e65a84a65cafa6023fa43400f0e36fbfc2f03b50372740dbdb8df64fa2ad8e4ec75e0905a01161c
-
SSDEEP
1536:PdQORIYaViJiuOpEoCXOJL3AqtFk+Cd/Z8RIu98:6OSpT2aLTt2+Cd/WRIu9
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2752 2708 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2708 2260 rundll32.exe 31 PID 2260 wrote to memory of 2708 2260 rundll32.exe 31 PID 2260 wrote to memory of 2708 2260 rundll32.exe 31 PID 2260 wrote to memory of 2708 2260 rundll32.exe 31 PID 2260 wrote to memory of 2708 2260 rundll32.exe 31 PID 2260 wrote to memory of 2708 2260 rundll32.exe 31 PID 2260 wrote to memory of 2708 2260 rundll32.exe 31 PID 2708 wrote to memory of 2752 2708 rundll32.exe 32 PID 2708 wrote to memory of 2752 2708 rundll32.exe 32 PID 2708 wrote to memory of 2752 2708 rundll32.exe 32 PID 2708 wrote to memory of 2752 2708 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03faa453852e32b85d1cdba0bd860cb5_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\03faa453852e32b85d1cdba0bd860cb5_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 2203⤵
- Program crash
PID:2752
-
-