Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 19:29
Static task
static1
Behavioral task
behavioral1
Sample
071c373e99fe7e9b99797906858c25c2_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
071c373e99fe7e9b99797906858c25c2_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
071c373e99fe7e9b99797906858c25c2_JaffaCakes118.dll
-
Size
256KB
-
MD5
071c373e99fe7e9b99797906858c25c2
-
SHA1
debb6e3a8d1543a67433bf081cd49c687068761f
-
SHA256
f4fc6461e7f0efb42c485cc263c0bb2c8bfd277c18d03c91b5e47c3ac45f1a3b
-
SHA512
3183de4267b4fe6b80464aadc347125a249dc98de5d06c7a40193aea00cf3582c0b6939793db5aa12aa9b42b6ee4c8e50510b987722bd55cead94b504c54878d
-
SSDEEP
6144:tlJA/dSY6MHHvUBur1niV0v2F182tbpNYQxtt:tlJwDHvUBG1niCvqh/YQxt
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4920 4144 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4844 wrote to memory of 4144 4844 rundll32.exe 82 PID 4844 wrote to memory of 4144 4844 rundll32.exe 82 PID 4844 wrote to memory of 4144 4844 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\071c373e99fe7e9b99797906858c25c2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\071c373e99fe7e9b99797906858c25c2_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4144 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4144 -s 5443⤵
- Program crash
PID:4920
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4144 -ip 41441⤵PID:1480