Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 08:15
Static task
static1
Behavioral task
behavioral1
Sample
2dc21fe02e24fdf01d07bf06f04bf2f1_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
2dc21fe02e24fdf01d07bf06f04bf2f1_JaffaCakes118.dll
-
Size
1.1MB
-
MD5
2dc21fe02e24fdf01d07bf06f04bf2f1
-
SHA1
8bf86eeb5a57e61d6b1a7919d574c87df31ab581
-
SHA256
4815225857fe5b70c4ca809b91710d151230927a7c18b84200bbaa8e6f9650a5
-
SHA512
aa7e12cf15c09e3e45622330845c23db973acdafef9a1818c5c66cba0412f3ced520fcbc0864b792c536d89068e4f2f8ae2e350dd24ff7b216db2da37f798631
-
SSDEEP
24576:IVwPFOzNrOkq2YLW9QM+VyeEaCaN00eVeIo2tFyYiPw:IVm8Ox2owQeVeIo2FyYB
Malware Config
Extracted
qakbot
402.363
tr
1632768770
140.82.49.12:443
186.18.205.199:995
177.130.82.197:2222
72.252.201.69:443
173.21.10.71:2222
67.165.206.193:993
37.210.152.224:995
68.204.7.158:443
89.101.97.139:443
47.22.148.6:443
120.151.47.189:443
47.40.196.233:2222
24.229.150.54:995
81.250.153.227:2222
76.25.142.196:443
71.74.12.34:443
181.118.183.94:443
24.55.112.61:443
24.139.72.117:443
120.150.218.241:995
185.250.148.74:443
109.12.111.14:443
187.156.138.172:443
95.77.223.148:443
71.80.168.245:443
81.241.252.59:2078
45.46.53.140:2222
105.157.55.133:995
82.77.137.101:995
173.234.155.233:443
136.232.34.70:443
105.198.236.99:443
103.148.120.144:443
27.223.92.142:995
73.151.236.31:443
75.188.35.168:443
5.238.149.235:61202
73.77.87.137:443
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
189.210.115.207:443
181.163.96.53:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3812 1040 WerFault.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 2392 wrote to memory of 1040 2392 rundll32.exe rundll32.exe PID 2392 wrote to memory of 1040 2392 rundll32.exe rundll32.exe PID 2392 wrote to memory of 1040 2392 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2dc21fe02e24fdf01d07bf06f04bf2f1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2dc21fe02e24fdf01d07bf06f04bf2f1_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1040 -s 6643⤵
- Program crash
PID:3812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1040 -ip 10401⤵PID:1988