Analysis
-
max time kernel
93s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 00:22
Static task
static1
Behavioral task
behavioral1
Sample
9815cda2e9bd11d544501355fcf96d3a_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9815cda2e9bd11d544501355fcf96d3a_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
9815cda2e9bd11d544501355fcf96d3a_JaffaCakes118.dll
-
Size
171KB
-
MD5
9815cda2e9bd11d544501355fcf96d3a
-
SHA1
b71979adc86f8cc1a50a7c66ed886b9381a13d1c
-
SHA256
e46d3cd472a14b20a710b0eb7227d203decdcf8b8becda61ca4253dbd6b883d7
-
SHA512
263558042f218ce520d53143bb0a646572bfb7b8c9680b35cb10a75ba17152c7a1d69d5e67889cc06b956d6451d1fd436171680e8915af74a19cf9a79f64e0a2
-
SSDEEP
3072:ksOycta3QtosQysRqVrK0nE2HT82D374VA/EmftmAiNMR:ksOttkNIE2HT82D37rsAiNMR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4744 TGzBe23 -
Program crash 1 IoCs
pid pid_target Process procid_target 2808 4744 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4000 wrote to memory of 4052 4000 rundll32.exe 83 PID 4000 wrote to memory of 4052 4000 rundll32.exe 83 PID 4000 wrote to memory of 4052 4000 rundll32.exe 83 PID 4052 wrote to memory of 4744 4052 rundll32.exe 84 PID 4052 wrote to memory of 4744 4052 rundll32.exe 84 PID 4052 wrote to memory of 4744 4052 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9815cda2e9bd11d544501355fcf96d3a_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9815cda2e9bd11d544501355fcf96d3a_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\TGzBe23"TGzBe23"3⤵
- Executes dropped EXE
PID:4744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 4084⤵
- Program crash
PID:2808
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4744 -ip 47441⤵PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97KB
MD5e608c77ac0e2b3a233e17c16c6a4f12d
SHA156079d02d3b103b7c3d632eb9f2fc83676f9716e
SHA25671343f66b132a6f76f1f5ac37b3db8f7fd7f045f85edcde4c251ec81f8316b39
SHA5126f233673018badbcf9ff49cd60f897ade2dff9c538896ceba9354e39bfa1588f0be5a59e0e0c857d74843a98be90e6ec1fa302dda5a57fc5aa2e8ba64f6942c7