Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 11:03
Behavioral task
behavioral1
Sample
JaffaCakes118_3fd106d697d9447d560d6124fd44c78c.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3fd106d697d9447d560d6124fd44c78c.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3fd106d697d9447d560d6124fd44c78c.dll
-
Size
136KB
-
MD5
3fd106d697d9447d560d6124fd44c78c
-
SHA1
bc57e7ec9cd2549937d560c73d38485c12b2b0b5
-
SHA256
39d58e4c55f02f2736eb1dee568dd3ed5e682c8a8908387d87f3580758db586e
-
SHA512
ea1f12d690ab9ca913156e0f98d5d58632a8879e7eaa60a28210568a40c56ae5130f448ae9630819a237030e3f6c10808fdd263c577e83ee755133e0c744631f
-
SSDEEP
3072:NG9v4jhq/Wg/+y14VyvZ27REiPdPTBft82IO+tLF1:NgvwsH/N1TaqiPdPTBl82IO+tLv
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rundll32.exe.txt rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1512 1060 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 768 wrote to memory of 1060 768 rundll32.exe 30 PID 768 wrote to memory of 1060 768 rundll32.exe 30 PID 768 wrote to memory of 1060 768 rundll32.exe 30 PID 768 wrote to memory of 1060 768 rundll32.exe 30 PID 768 wrote to memory of 1060 768 rundll32.exe 30 PID 768 wrote to memory of 1060 768 rundll32.exe 30 PID 768 wrote to memory of 1060 768 rundll32.exe 30 PID 1060 wrote to memory of 1512 1060 rundll32.exe 31 PID 1060 wrote to memory of 1512 1060 rundll32.exe 31 PID 1060 wrote to memory of 1512 1060 rundll32.exe 31 PID 1060 wrote to memory of 1512 1060 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3fd106d697d9447d560d6124fd44c78c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3fd106d697d9447d560d6124fd44c78c.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 2483⤵
- Program crash
PID:1512
-
-