Analysis
-
max time kernel
94s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 17:08
Behavioral task
behavioral1
Sample
JaffaCakes118_417893911eabbdce7ecf0996b41c6b65.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_417893911eabbdce7ecf0996b41c6b65.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_417893911eabbdce7ecf0996b41c6b65.dll
-
Size
372KB
-
MD5
417893911eabbdce7ecf0996b41c6b65
-
SHA1
b83133af6454beab7c3a6603a8efdc81457d08b0
-
SHA256
36484ef0c87b8f698390365d5dc857b89204096d6e6ebd0a5302e7f58c238519
-
SHA512
7df847e986accd1e1110fea29a25a822416f11dc39735d1f7d8980db2a667151a6078661de6edf903f53dea74dd63777f7784d067a3ede7dd9b2a7543fb314ed
-
SSDEEP
6144:/rQCe8R669RsInCt3TBljn97HOsGc11Ll9s:/rQtboRsIW3T3hjOsGcrXs
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2380 1908 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1940 wrote to memory of 1908 1940 rundll32.exe 30 PID 1940 wrote to memory of 1908 1940 rundll32.exe 30 PID 1940 wrote to memory of 1908 1940 rundll32.exe 30 PID 1940 wrote to memory of 1908 1940 rundll32.exe 30 PID 1940 wrote to memory of 1908 1940 rundll32.exe 30 PID 1940 wrote to memory of 1908 1940 rundll32.exe 30 PID 1940 wrote to memory of 1908 1940 rundll32.exe 30 PID 1908 wrote to memory of 2380 1908 rundll32.exe 31 PID 1908 wrote to memory of 2380 1908 rundll32.exe 31 PID 1908 wrote to memory of 2380 1908 rundll32.exe 31 PID 1908 wrote to memory of 2380 1908 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_417893911eabbdce7ecf0996b41c6b65.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_417893911eabbdce7ecf0996b41c6b65.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 2323⤵
- Program crash
PID:2380
-
-