Analysis
-
max time kernel
131s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 00:58
Behavioral task
behavioral1
Sample
JaffaCakes118_3cd09e6fdc4fb934520ae11f1bbd4a1c.dll
Resource
win7-20240903-en
5 signatures
150 seconds
General
-
Target
JaffaCakes118_3cd09e6fdc4fb934520ae11f1bbd4a1c.dll
-
Size
94KB
-
MD5
3cd09e6fdc4fb934520ae11f1bbd4a1c
-
SHA1
1f9789a91e4f848e0932a337ef6303c5b625d5e5
-
SHA256
fbbd316d9c15abb7c817761dbc2585b655b512ae7b79f1f26da9b7a7256d3949
-
SHA512
2e83d86235cd3ed8c24e2eeec26f759631dd02aaac8d7db4c308edcefd41667fea8231045a97bdc6f799f577d62b1d82db3f498a29947d38f8aaf798628dd374
-
SSDEEP
1536:FPU/q1TDnXo7vRAI9k1Lcd/nMLie+ccSpJfDJAp2ycnSr6hK:FPU/qxXo7iI9uLcxHe+nSpJDJA7cnS2h
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/4820-0-0x0000000010000000-0x000000001001A000-memory.dmp family_gh0strat behavioral2/memory/4820-1-0x0000000010000000-0x000000001001A000-memory.dmp family_gh0strat -
Gh0strat family
-
Program crash 1 IoCs
pid pid_target Process procid_target 860 4820 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3728 wrote to memory of 4820 3728 rundll32.exe 85 PID 3728 wrote to memory of 4820 3728 rundll32.exe 85 PID 3728 wrote to memory of 4820 3728 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3cd09e6fdc4fb934520ae11f1bbd4a1c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3cd09e6fdc4fb934520ae11f1bbd4a1c.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 6603⤵
- Program crash
PID:860
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4820 -ip 48201⤵PID:2068