Analysis
-
max time kernel
94s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
25144402f82724b45e0f6ccd368760a3_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25144402f82724b45e0f6ccd368760a3_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
25144402f82724b45e0f6ccd368760a3_JaffaCakes118.dll
-
Size
20KB
-
MD5
25144402f82724b45e0f6ccd368760a3
-
SHA1
962cf1be991a3aade331dabcab47c1db1dd9c2a9
-
SHA256
6121f838d5ab5597bcb6575b4d42ff1e6f60ae8443e42b10c6c1d77ec696f90e
-
SHA512
8a474941f17b1f8eacea2466f4802953bc581a689dbe73af45b937b40ef4614a5495677a53163af6e0385fe7f7fdf1f68437c11ec00eba9a5246ac0e0bef0c9d
-
SSDEEP
384:zSG/2Jp+C6QhtmruxCcdIL+0XplcBCAu8UaWHuqaTlX0wG:zfYh2oCtpXPcBx2OqaewG
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1504 1732 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1732 rundll32.exe 1732 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3352 wrote to memory of 1732 3352 rundll32.exe 83 PID 3352 wrote to memory of 1732 3352 rundll32.exe 83 PID 3352 wrote to memory of 1732 3352 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25144402f82724b45e0f6ccd368760a3_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\25144402f82724b45e0f6ccd368760a3_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 6243⤵
- Program crash
PID:1504
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1732 -ip 17321⤵PID:4820