Analysis
-
max time kernel
94s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 09:50
Static task
static1
Behavioral task
behavioral1
Sample
3f2b93693cb435f01245b6bea149fd4a_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
3f2b93693cb435f01245b6bea149fd4a_JaffaCakes118.dll
-
Size
1.3MB
-
MD5
3f2b93693cb435f01245b6bea149fd4a
-
SHA1
48fa4115e07d1fafb608f78bd7a4cecaf3a6125a
-
SHA256
f300aec16dce68a11657edef3530a645f0ef26eef456c631edbb536ae6ac9509
-
SHA512
190b7d167ff83abb9b9565c1f09ac18977c7a700200a2af2aff708663b115d227107820be928fd6230cd99aa4890262d1044f8bcc1daa96614d1b117cb996ba8
-
SSDEEP
24576:+iWgjZ6nrdmwpViRRXNX/Wumo7awRAYZJBihgSxtFyYiPw:H0TuvOXYDBieaFyYB
Malware Config
Extracted
qakbot
402.363
tr_domain
1632769003
140.82.49.12:443
186.18.205.199:995
177.130.82.197:2222
72.252.201.69:443
173.21.10.71:2222
67.165.206.193:993
37.210.152.224:995
68.204.7.158:443
89.101.97.139:443
47.22.148.6:443
120.151.47.189:443
47.40.196.233:2222
24.229.150.54:995
81.250.153.227:2222
76.25.142.196:443
71.74.12.34:443
181.118.183.94:443
24.55.112.61:443
24.139.72.117:443
120.150.218.241:995
185.250.148.74:443
109.12.111.14:443
187.156.138.172:443
95.77.223.148:443
71.80.168.245:443
81.241.252.59:2078
45.46.53.140:2222
105.157.55.133:995
82.77.137.101:995
173.234.155.233:443
136.232.34.70:443
105.198.236.99:443
103.148.120.144:443
27.223.92.142:995
73.151.236.31:443
75.188.35.168:443
5.238.149.235:61202
73.77.87.137:443
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
189.210.115.207:443
181.163.96.53:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1020 536 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4984 wrote to memory of 536 4984 rundll32.exe 83 PID 4984 wrote to memory of 536 4984 rundll32.exe 83 PID 4984 wrote to memory of 536 4984 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f2b93693cb435f01245b6bea149fd4a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f2b93693cb435f01245b6bea149fd4a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 536 -s 6843⤵
- Program crash
PID:1020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 536 -ip 5361⤵PID:4288