Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 02:41
Behavioral task
behavioral1
Sample
JaffaCakes118_eb58d415cc6c7c0fb73f03677f70dcdfa77e50dcc51be8aa038f8c27248146ae.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_eb58d415cc6c7c0fb73f03677f70dcdfa77e50dcc51be8aa038f8c27248146ae.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_eb58d415cc6c7c0fb73f03677f70dcdfa77e50dcc51be8aa038f8c27248146ae.dll
-
Size
348KB
-
MD5
1c89b6abab4f04bef9babba7a1ecc2fd
-
SHA1
55043ca8f769f4985d1aebe4e298faab58c65079
-
SHA256
eb58d415cc6c7c0fb73f03677f70dcdfa77e50dcc51be8aa038f8c27248146ae
-
SHA512
a06e1dd6169e24d279f550eea8fa2e8ed60fef7fed18efd2d2edc8d69da7794aa8ec647c53d846236feef0bd17dbd4735355ad1b87711f8273beafe8a84bbb7f
-
SSDEEP
768:YzD+JD0NU3JFPvEzyikFsIAgLlKbOzJKxxJrMjriweVnSB4H37hyMnQVC:YzD+R0MHic6TMlKACxOJeV5H37hLnQ0
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1732 1764 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1764 2072 rundll32.exe 31 PID 2072 wrote to memory of 1764 2072 rundll32.exe 31 PID 2072 wrote to memory of 1764 2072 rundll32.exe 31 PID 2072 wrote to memory of 1764 2072 rundll32.exe 31 PID 2072 wrote to memory of 1764 2072 rundll32.exe 31 PID 2072 wrote to memory of 1764 2072 rundll32.exe 31 PID 2072 wrote to memory of 1764 2072 rundll32.exe 31 PID 1764 wrote to memory of 1732 1764 rundll32.exe 32 PID 1764 wrote to memory of 1732 1764 rundll32.exe 32 PID 1764 wrote to memory of 1732 1764 rundll32.exe 32 PID 1764 wrote to memory of 1732 1764 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eb58d415cc6c7c0fb73f03677f70dcdfa77e50dcc51be8aa038f8c27248146ae.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_eb58d415cc6c7c0fb73f03677f70dcdfa77e50dcc51be8aa038f8c27248146ae.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1764 -s 1923⤵
- Program crash
PID:1732
-
-