Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 08:32
Static task
static1
Behavioral task
behavioral1
Sample
1298278e4ba6e2cac430d36ef35f9264_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1298278e4ba6e2cac430d36ef35f9264_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
1298278e4ba6e2cac430d36ef35f9264_JaffaCakes118.dll
-
Size
624KB
-
MD5
1298278e4ba6e2cac430d36ef35f9264
-
SHA1
11f7262323419e5ee12589d690754673a5616243
-
SHA256
d590b9a245bf55f2eecd5cfd045048e4cc94a76c5ac43b02862ced86a93ce230
-
SHA512
4d7fdc4896b22829357e141551292dceb2efbb29e336e92cdc439b4d2aab676bc0a2d80d0bac85b93f1ba44816d8b620a6009795e9dcc53cb75d6899dfefb49d
-
SSDEEP
12288:LkGd8C8oezz6Hm57P4P79AY8OczR0Msl+Qd1/k:gGzReaHD79AYiabH
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2756 2768 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2768 2712 rundll32.exe 30 PID 2712 wrote to memory of 2768 2712 rundll32.exe 30 PID 2712 wrote to memory of 2768 2712 rundll32.exe 30 PID 2712 wrote to memory of 2768 2712 rundll32.exe 30 PID 2712 wrote to memory of 2768 2712 rundll32.exe 30 PID 2712 wrote to memory of 2768 2712 rundll32.exe 30 PID 2712 wrote to memory of 2768 2712 rundll32.exe 30 PID 2768 wrote to memory of 2756 2768 rundll32.exe 31 PID 2768 wrote to memory of 2756 2768 rundll32.exe 31 PID 2768 wrote to memory of 2756 2768 rundll32.exe 31 PID 2768 wrote to memory of 2756 2768 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1298278e4ba6e2cac430d36ef35f9264_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1298278e4ba6e2cac430d36ef35f9264_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 2283⤵
- Program crash
PID:2756
-
-