Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2025, 06:33

General

  • Target

    JaffaCakes118_3e7d0931279825a69077a373b37d76b5.dll

  • Size

    24.0MB

  • MD5

    3e7d0931279825a69077a373b37d76b5

  • SHA1

    a06c72e0067a48ba55a938c0c336ad0c4b2fe5f4

  • SHA256

    b4a8a8f51c3f72d9e1b86937ea2291cb4ed601ed9f37bf0c3cfab608d953f0c5

  • SHA512

    d6964e5df178be80c30c7e492927063d452da563fcce35af5c294a8beda405128f3fba2bd7346bfcc4f4c47446f39b31146dcbc4132bff554a4894e59fa8ca07

  • SSDEEP

    3072:PBtSf+yOmPD8IRr+PqbssYPx5HcTBfthHr5vnFPn8Sf+u:PBTyPRqyhYPbHcTBlhHrlndncu

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e7d0931279825a69077a373b37d76b5.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3188
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3e7d0931279825a69077a373b37d76b5.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3396
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3396 -s 640
        3⤵
        • Program crash
        PID:4628
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3396 -ip 3396
    1⤵
      PID:3524

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads