Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 05:55
Behavioral task
behavioral1
Sample
JaffaCakes118_96694324049f8389fb27c0d414f29c8b509ed2142bdb6c945bf6ce5515311a9e.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_96694324049f8389fb27c0d414f29c8b509ed2142bdb6c945bf6ce5515311a9e.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_96694324049f8389fb27c0d414f29c8b509ed2142bdb6c945bf6ce5515311a9e.dll
-
Size
528KB
-
MD5
c1bfa8a21ae70987bc088612c951a8d2
-
SHA1
b7e17762104d7755431d7a2d848fbc23d0969030
-
SHA256
96694324049f8389fb27c0d414f29c8b509ed2142bdb6c945bf6ce5515311a9e
-
SHA512
e533c9b6ddfcf162f57772d8f76ccf0d722569f3c2dccfd4151da91b5588e56ecd05ac6d0ebe2f23fe171d40c3a9f4f9f32439bd3d2183f619af6edb111a05a3
-
SSDEEP
1536:7c/Wtm8uuUN0eWpPNu7iZEf1IpK7GHFV9:7c/Wtm8uuUN0egPNQi27k
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2164 2280 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2280 2364 rundll32.exe 30 PID 2364 wrote to memory of 2280 2364 rundll32.exe 30 PID 2364 wrote to memory of 2280 2364 rundll32.exe 30 PID 2364 wrote to memory of 2280 2364 rundll32.exe 30 PID 2364 wrote to memory of 2280 2364 rundll32.exe 30 PID 2364 wrote to memory of 2280 2364 rundll32.exe 30 PID 2364 wrote to memory of 2280 2364 rundll32.exe 30 PID 2280 wrote to memory of 2164 2280 rundll32.exe 31 PID 2280 wrote to memory of 2164 2280 rundll32.exe 31 PID 2280 wrote to memory of 2164 2280 rundll32.exe 31 PID 2280 wrote to memory of 2164 2280 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96694324049f8389fb27c0d414f29c8b509ed2142bdb6c945bf6ce5515311a9e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_96694324049f8389fb27c0d414f29c8b509ed2142bdb6c945bf6ce5515311a9e.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 1923⤵
- Program crash
PID:2164
-
-