Analysis
-
max time kernel
93s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 08:58
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
17076c9d7008675f41f4301165564058_JaffaCakes118.dll
Resource
win7-20240903-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
17076c9d7008675f41f4301165564058_JaffaCakes118.dll
Resource
win10v2004-20240802-en
3 signatures
150 seconds
General
-
Target
17076c9d7008675f41f4301165564058_JaffaCakes118.dll
-
Size
2KB
-
MD5
17076c9d7008675f41f4301165564058
-
SHA1
3bc2b75e66e94f21ebfb47bea40a0cc052a75193
-
SHA256
945b4a2d9db472159a8314cbb149757e87649ed2fb372797d293396a4330eaf5
-
SHA512
e746451ae5e978e5fc39c1ae4c38c2c2ea62e8efdf933682b5967a7d7c8a7ccab3d33becbd2cb781542f2c71092b5998a36c8bb250f04cc17873ca5d9b87831e
Score
3/10
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4844 3420 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3416 wrote to memory of 3420 3416 rundll32.exe 81 PID 3416 wrote to memory of 3420 3416 rundll32.exe 81 PID 3416 wrote to memory of 3420 3416 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17076c9d7008675f41f4301165564058_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17076c9d7008675f41f4301165564058_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 5443⤵
- Program crash
PID:4844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3420 -ip 34201⤵PID:4668