Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-10-2024 14:42
Static task
static1
Behavioral task
behavioral1
Sample
063afda0cbe5ee7600b21c0dfcf3d9d1_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
063afda0cbe5ee7600b21c0dfcf3d9d1_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
063afda0cbe5ee7600b21c0dfcf3d9d1_JaffaCakes118.dll
-
Size
842KB
-
MD5
063afda0cbe5ee7600b21c0dfcf3d9d1
-
SHA1
5f2feaa61a4cf0d3e9309ea5aac3d7929b8127ea
-
SHA256
0008892019deb0af9a883ca4a3b776a107b17dae7dd05f634a929c95aa9dba65
-
SHA512
1a09bd8e30928ef1b32f50f272b3b309fd97adddc9034e4ef1430d21c3d0f4b111c5a263a5f38faebaa62f1410e406f88bf0348d2269c3a8597d76c272435336
-
SSDEEP
24576:hDCQ2RUM4yclSVw3Rs0HYsqEeGWmQH2NkR6S2FYA2+Na:v84JuR2NksS2dNa
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1868 1752 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1852 wrote to memory of 1752 1852 rundll32.exe 31 PID 1852 wrote to memory of 1752 1852 rundll32.exe 31 PID 1852 wrote to memory of 1752 1852 rundll32.exe 31 PID 1852 wrote to memory of 1752 1852 rundll32.exe 31 PID 1852 wrote to memory of 1752 1852 rundll32.exe 31 PID 1852 wrote to memory of 1752 1852 rundll32.exe 31 PID 1852 wrote to memory of 1752 1852 rundll32.exe 31 PID 1752 wrote to memory of 1868 1752 rundll32.exe 32 PID 1752 wrote to memory of 1868 1752 rundll32.exe 32 PID 1752 wrote to memory of 1868 1752 rundll32.exe 32 PID 1752 wrote to memory of 1868 1752 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\063afda0cbe5ee7600b21c0dfcf3d9d1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\063afda0cbe5ee7600b21c0dfcf3d9d1_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 2643⤵
- Program crash
PID:1868
-
-