Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
39756536ce45432df5d386962c348d6b_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39756536ce45432df5d386962c348d6b_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
39756536ce45432df5d386962c348d6b_JaffaCakes118.dll
-
Size
276KB
-
MD5
39756536ce45432df5d386962c348d6b
-
SHA1
ed5e18af6bd3d63a7a47f9cb6b6fb028c0597b0a
-
SHA256
7f70253d3fe3d3b7ea9053a79335e9664fe2cfd13f393dc6b4e7b07a39911155
-
SHA512
5feb61f70f9652382d070c7a5be6d7f24a3759e35aa4bbddd84fd0a3d36c348de26fbcdd3810f13516c5512c8ae47e422d2f550f26efb3fa32902aa8a0a4ec89
-
SSDEEP
3072:d4S6lHdvcUNGAYjpc1V9tnnRjfX4jQ94tPxbVnJesWeTXRofrasnGn0thwLXTB4V:6ndvcUNjYO9hBQQ94txbVaeEcswLjA
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2392 1740 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1744 wrote to memory of 1740 1744 rundll32.exe 30 PID 1744 wrote to memory of 1740 1744 rundll32.exe 30 PID 1744 wrote to memory of 1740 1744 rundll32.exe 30 PID 1744 wrote to memory of 1740 1744 rundll32.exe 30 PID 1744 wrote to memory of 1740 1744 rundll32.exe 30 PID 1744 wrote to memory of 1740 1744 rundll32.exe 30 PID 1744 wrote to memory of 1740 1744 rundll32.exe 30 PID 1740 wrote to memory of 2392 1740 rundll32.exe 31 PID 1740 wrote to memory of 2392 1740 rundll32.exe 31 PID 1740 wrote to memory of 2392 1740 rundll32.exe 31 PID 1740 wrote to memory of 2392 1740 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39756536ce45432df5d386962c348d6b_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\39756536ce45432df5d386962c348d6b_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1740 -s 2603⤵
- Program crash
PID:2392
-
-