Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
54c10d194477f776c11d5fd799a32461_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
54c10d194477f776c11d5fd799a32461_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
54c10d194477f776c11d5fd799a32461_JaffaCakes118.dll
-
Size
128KB
-
MD5
54c10d194477f776c11d5fd799a32461
-
SHA1
07d2e807a62cac1b32b2bf7fb43cc4b388b6eba3
-
SHA256
c6993ba609c2b4753151618b0ce77df670e6ffc8e918b8b7082edf8620f482ef
-
SHA512
1f6b0437a9d897388a9f6f31e50d4fe33a79f3458ff2787c7c6196b8d1bd09609c7367430ba5d63bdf3a379ce1f030e28baf81ef7168344bb41dc6de042c2475
-
SSDEEP
3072:GmmLaSuoYPQRbFBd6trerdsd4XD7Tt74VrwuVtCOt8bFik:GmyU/4d/doreWdC7574VrhVAOtsFik
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2144 3780 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1364 wrote to memory of 3780 1364 rundll32.exe 86 PID 1364 wrote to memory of 3780 1364 rundll32.exe 86 PID 1364 wrote to memory of 3780 1364 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54c10d194477f776c11d5fd799a32461_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\54c10d194477f776c11d5fd799a32461_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3780 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 6163⤵
- Program crash
PID:2144
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3780 -ip 37801⤵PID:820