Analysis
-
max time kernel
95s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 10:20
Behavioral task
behavioral1
Sample
3f4b546dd3da31a36f2af8f31cee1e79_JaffaCakes118.dll
Resource
win7-20240903-en
windows7-x64
4 signatures
150 seconds
General
-
Target
3f4b546dd3da31a36f2af8f31cee1e79_JaffaCakes118.dll
-
Size
315KB
-
MD5
3f4b546dd3da31a36f2af8f31cee1e79
-
SHA1
6992a3c857e1abbbb304bc74e24cdc80548358eb
-
SHA256
25291979e98b0dbd813664abe9af7360f01dca46f12d023b0a757d637d484d55
-
SHA512
f847239f0d9b52e7fa380554620bec4e1e50e2bc3efe63e0902c6556290e32613846d0cc52a740240d95d8da6258712996b83d2a3ed7e99a3434a8eaa9e34963
-
SSDEEP
6144:EoUUXDd6DVa4e/ndiR6avkd0AFR0uEeDgUtDGP+JPyVo5E5B:Eo7R6DWvam0AFR0uJxZLPyVo5
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/364-0-0x0000000000400000-0x000000000054F000-memory.dmp upx behavioral2/memory/364-2-0x0000000000400000-0x000000000054F000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3780 364 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3640 wrote to memory of 364 3640 rundll32.exe 83 PID 3640 wrote to memory of 364 3640 rundll32.exe 83 PID 3640 wrote to memory of 364 3640 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f4b546dd3da31a36f2af8f31cee1e79_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f4b546dd3da31a36f2af8f31cee1e79_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 364 -s 6603⤵
- Program crash
PID:3780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 364 -ip 3641⤵PID:4672