Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/10/2024, 11:17
Behavioral task
behavioral1
Sample
17dcbf87e8c30b3e3150d2296d722bdf_JaffaCakes118.dll
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
17dcbf87e8c30b3e3150d2296d722bdf_JaffaCakes118.dll
-
Size
76KB
-
MD5
17dcbf87e8c30b3e3150d2296d722bdf
-
SHA1
8771513a4ca999dee5eb7284d455a9e1339ad683
-
SHA256
34550a9b2b475bc3416739e568fb27a52d4cd89683cdb0c0dc58daf8130187ca
-
SHA512
620738efd157727c586c9a534f9d7dace52cb467dd35ec1916d1afd161c144684a64ad90b235ab6972e6ea434510c43125c32df75240f9e9c6f9ecff7919714f
-
SSDEEP
1536:JLwmzkn+mBg+r5GgLdEkK9fNEjP0UcEtKCQV4i6NoVuT:h8g+t5LdEkKl80gKR+iMB
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1048-0-0x0000000010000000-0x0000000010034000-memory.dmp upx behavioral2/memory/1048-1-0x0000000010000000-0x0000000010034000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1032 1048 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1048 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4304 wrote to memory of 1048 4304 rundll32.exe 82 PID 4304 wrote to memory of 1048 4304 rundll32.exe 82 PID 4304 wrote to memory of 1048 4304 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17dcbf87e8c30b3e3150d2296d722bdf_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\17dcbf87e8c30b3e3150d2296d722bdf_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 6763⤵
- Program crash
PID:1032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1048 -ip 10481⤵PID:2380