Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2024 14:05

General

  • Target

    JaffaCakes118_46e35620df547e528029f67e60ee1b3f7263d7f8a20141cf040e13cc7c465f20.dll

  • Size

    528KB

  • MD5

    535aa4829807f334644c0c004b915317

  • SHA1

    39613fb1c266a68c3c6c8919b1790b11e81f3e25

  • SHA256

    46e35620df547e528029f67e60ee1b3f7263d7f8a20141cf040e13cc7c465f20

  • SHA512

    64696f7aa7f5e33dcabd664e2f3e68c63b93013c0dd76a1c5d46560e9f7b4e4ab48400dc071da24adfb72f3fc4aac045e87390e7d2799b2fcbb72d7568cdc9fe

  • SSDEEP

    1536:qzA3IdWuuUN0eWpPNu7iZEf1IpK7GHFV9:qzA3IdWuuUN0egPNQi27k

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_46e35620df547e528029f67e60ee1b3f7263d7f8a20141cf040e13cc7c465f20.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_46e35620df547e528029f67e60ee1b3f7263d7f8a20141cf040e13cc7c465f20.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4588
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 560
        3⤵
        • Program crash
        PID:3244
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4588 -ip 4588
    1⤵
      PID:2368

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads