Analysis
-
max time kernel
95s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 23:48
Behavioral task
behavioral1
Sample
JaffaCakes118_5084fd0e6e1f0399ab2e9ce6d41c4857.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5084fd0e6e1f0399ab2e9ce6d41c4857.dll
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_5084fd0e6e1f0399ab2e9ce6d41c4857.dll
-
Size
1024KB
-
MD5
5084fd0e6e1f0399ab2e9ce6d41c4857
-
SHA1
0258d33a0e4663fd39dc543873618f7ec64208c8
-
SHA256
4b157d3d195856d772eda78787d27eb7e7341e2da3a6017d4d6cfbb3f9f3587c
-
SHA512
72e0b60bff13fa900f44155efb01e5886f05e00ec03f5cacc902e66ac51289c196099774f7ad0dcab7ceaa69592d8378d529d59a9bf539ddcc982462f8a53a7c
-
SSDEEP
3072:W1Jz2Rhid4rvs845dn55qEuetoj2LTBftvnydu:W1aZD45d3qnDSLTBlvny
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 4828 1240 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4796 wrote to memory of 1240 4796 rundll32.exe 81 PID 4796 wrote to memory of 1240 4796 rundll32.exe 81 PID 4796 wrote to memory of 1240 4796 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5084fd0e6e1f0399ab2e9ce6d41c4857.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5084fd0e6e1f0399ab2e9ce6d41c4857.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1240 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1240 -s 6323⤵
- Program crash
PID:4828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1240 -ip 12401⤵PID:368