Analysis
-
max time kernel
96s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 02:20
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_85f1344124cd347dc512f76f3835bde5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_85f1344124cd347dc512f76f3835bde5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
TestProj.dll
Resource
win7-20241023-en
Behavioral task
behavioral6
Sample
TestProj.dll
Resource
win10v2004-20241007-en
General
-
Target
TestProj.dll
-
Size
21KB
-
MD5
b4c007c9a2638a09d8872ba51dd61ac2
-
SHA1
55d1bb5f4128ab1aecd5ea5768da89c6671cdb47
-
SHA256
3979d4ad8ea65508ed096e57c338eca5171ab1b7cc05ff266792116ed41ec679
-
SHA512
5b725e9f6517cdf09a2eb0966d61fce5dc86a6a2f325538b07d1e604d8c3b552e74f6ad8db0c7442377033032700763a2afa84fbbe08998a3012300bc6080b33
-
SSDEEP
384:+NczJ4syB16lMbAaW4Vd8M2tRNCCi9SSYfOIzi/fPa8hnnnnn6:GczA4l2W4VotRNNisti3yunnn6
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4340 3644 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4360 wrote to memory of 3644 4360 rundll32.exe 82 PID 4360 wrote to memory of 3644 4360 rundll32.exe 82 PID 4360 wrote to memory of 3644 4360 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\TestProj.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\TestProj.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:3644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 7243⤵
- Program crash
PID:4340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3644 -ip 36441⤵PID:732