Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
083ac3f1c30ad0b5fb2ed360174c4105_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
083ac3f1c30ad0b5fb2ed360174c4105_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
083ac3f1c30ad0b5fb2ed360174c4105_JaffaCakes118.dll
-
Size
43KB
-
MD5
083ac3f1c30ad0b5fb2ed360174c4105
-
SHA1
507db43847f058a59252873c7d571089d45d82b6
-
SHA256
ed4a1f5faae8fad1c19c479f127aada16ab946000179dfa4ab28c12cf8c61a6f
-
SHA512
55e3b7aec90aea8aa25327b2a5938c68e5d9b266d4d918ecd454f04acf8bf1dd478c485539c78338a540dde5633cc759ab5ad08987a1a4321ffefc5b9f682b07
-
SSDEEP
768:7hf2jrbQOwPTMblLOP82XZU+IznVytlSrZK7oAh1JiGSMi1uoio9vH:74nMOwPTMb0PFXiznVy+UdVBSSNoNH
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4764 3116 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1652 wrote to memory of 3116 1652 rundll32.exe 89 PID 1652 wrote to memory of 3116 1652 rundll32.exe 89 PID 1652 wrote to memory of 3116 1652 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\083ac3f1c30ad0b5fb2ed360174c4105_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\083ac3f1c30ad0b5fb2ed360174c4105_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 5603⤵
- Program crash
PID:4764
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3116 -ip 31161⤵PID:4444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4348,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=1292 /prefetch:81⤵PID:1472