Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
048501525bd83d7b623093818e7b3e9c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
048501525bd83d7b623093818e7b3e9c_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
048501525bd83d7b623093818e7b3e9c_JaffaCakes118.dll
-
Size
938KB
-
MD5
048501525bd83d7b623093818e7b3e9c
-
SHA1
69bf02e2934bd78bbd90499002a1b9ce9bee5a14
-
SHA256
a48e4697e099da99d5a1204ddfb83ae410fb27de7ed764672ad771e44f391f74
-
SHA512
abfa8bb998e038f4e98a8810f572d9b52f2a6ee1ca386605903434ee502da81108dd2dba3edbbdc3757553920e2aa3b12664ba4013ae46d21564b89c6176b0e4
-
SSDEEP
12288:L98x0LcKGcoKQDr8xJ3La5s5yjGLrYpyb90hvCC:L9StKGcE8+kmwrYQWv
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3200 1788 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1788 rundll32.exe Token: SeSecurityPrivilege 1788 rundll32.exe Token: SeTakeOwnershipPrivilege 1788 rundll32.exe Token: SeLoadDriverPrivilege 1788 rundll32.exe Token: SeSystemProfilePrivilege 1788 rundll32.exe Token: SeSystemtimePrivilege 1788 rundll32.exe Token: SeProfSingleProcessPrivilege 1788 rundll32.exe Token: SeIncBasePriorityPrivilege 1788 rundll32.exe Token: SeCreatePagefilePrivilege 1788 rundll32.exe Token: SeShutdownPrivilege 1788 rundll32.exe Token: SeDebugPrivilege 1788 rundll32.exe Token: SeSystemEnvironmentPrivilege 1788 rundll32.exe Token: SeRemoteShutdownPrivilege 1788 rundll32.exe Token: SeUndockPrivilege 1788 rundll32.exe Token: SeManageVolumePrivilege 1788 rundll32.exe Token: 33 1788 rundll32.exe Token: 34 1788 rundll32.exe Token: 35 1788 rundll32.exe Token: 36 1788 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4728 wrote to memory of 1788 4728 rundll32.exe 82 PID 4728 wrote to memory of 1788 4728 rundll32.exe 82 PID 4728 wrote to memory of 1788 4728 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\048501525bd83d7b623093818e7b3e9c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\048501525bd83d7b623093818e7b3e9c_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 6323⤵
- Program crash
PID:3200
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1788 -ip 17881⤵PID:2912