Analysis
-
max time kernel
141s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 02:08
Static task
static1
Behavioral task
behavioral1
Sample
454cc610e7f352fe730059c05dfe51f4_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
454cc610e7f352fe730059c05dfe51f4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
System.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Zoroastrians.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Zoroastrians.dll
Resource
win10v2004-20241007-en
General
-
Target
Zoroastrians.dll
-
Size
48KB
-
MD5
4c3798bce21134782f690a2bbb1b1252
-
SHA1
91d76bea0cdafb5d40a2fb9b66810ebe7e94a344
-
SHA256
f47aaf953a2e082e921025f7407a1ace17e893b3d7d7d0752e0c91bbf3b8a23b
-
SHA512
4e12aff60aa0f298d6be13a5c9586ad5c6b9eab986e26c2d0b2210b14b649db691f8a641e544ef42f11927c7a2022ffb632bce8d4c5f8fa01794994aca6584c4
-
SSDEEP
768:qp+Y14HEDpcf4DuqzMYylhTC5eeYki6IdVtk:i1VXeTCpO6It
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 876 2900 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4104 wrote to memory of 2900 4104 rundll32.exe 84 PID 4104 wrote to memory of 2900 4104 rundll32.exe 84 PID 4104 wrote to memory of 2900 4104 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Zoroastrians.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Zoroastrians.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 6123⤵
- Program crash
PID:876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2900 -ip 29001⤵PID:3132