Analysis
-
max time kernel
94s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2025 20:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ac30e2486a187b3532c8ff60991268b9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ac30e2486a187b3532c8ff60991268b9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/fqfwqcrlvs.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/fqfwqcrlvs.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/fqfwqcrlvs.dll
-
Size
48KB
-
MD5
2dcfaed029e76d404de8c562e9618fc3
-
SHA1
ad586f14bf71ea471905da2e424e872432f60d5e
-
SHA256
54e000d6cbf51dbda212135ecaeae42da9bbd5e4d42bfe472c1df975308ef4ec
-
SHA512
953da849e7f926ff617a9aca550bda7693b66a58a86da4ae202d4423a926a0d0adfaf7331d9ca113f0f5c867ebaa703f467b642e2ac3735ba811868cebf0427a
-
SSDEEP
768:n/7Fk2J334zzF1UJ+Eyp/VBdnU/4tK+Fg4JvXQxkAUQxg9q:n/7XVIzzF12+EsdnW4I+FJJ/Qx0lq
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2796 3440 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1136 wrote to memory of 3440 1136 rundll32.exe 83 PID 1136 wrote to memory of 3440 1136 rundll32.exe 83 PID 1136 wrote to memory of 3440 1136 rundll32.exe 83 PID 3440 wrote to memory of 608 3440 rundll32.exe 84 PID 3440 wrote to memory of 608 3440 rundll32.exe 84 PID 3440 wrote to memory of 608 3440 rundll32.exe 84 PID 3440 wrote to memory of 608 3440 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\fqfwqcrlvs.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\fqfwqcrlvs.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\fqfwqcrlvs.dll,#13⤵PID:608
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 7403⤵
- Program crash
PID:2796
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3440 -ip 34401⤵PID:4892