Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 08:57
Static task
static1
Behavioral task
behavioral1
Sample
3938a399a4d116ae812f41cf4bd3c42d_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3938a399a4d116ae812f41cf4bd3c42d_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
3938a399a4d116ae812f41cf4bd3c42d_JaffaCakes118.dll
-
Size
172KB
-
MD5
3938a399a4d116ae812f41cf4bd3c42d
-
SHA1
72cb11bcf146151057e4c99f3ad4106da7a67e9d
-
SHA256
7706ac298a060fdcd7dd450092620e70c5a1714aff9f4eb61b0f884e25016168
-
SHA512
a13cff1cbd393364ed99ef3c0f8181d7def32ed73ed76f6e7fa51f2fd5a90e4ed45bf20c36608127824eec7182294488250a97353e5a5d3878a97509716c1286
-
SSDEEP
3072:BmfVCyNYUv8FiGZmvKs7KoRjhRj80P5EmXYrXr2ZvV0a:kfVPTvuiGZmvzKoRjr40PWmX8C9
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4388 4196 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4048 wrote to memory of 4196 4048 rundll32.exe 83 PID 4048 wrote to memory of 4196 4048 rundll32.exe 83 PID 4048 wrote to memory of 4196 4048 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3938a399a4d116ae812f41cf4bd3c42d_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3938a399a4d116ae812f41cf4bd3c42d_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4196 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 5603⤵
- Program crash
PID:4388
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4196 -ip 41961⤵PID:4228