Analysis
-
max time kernel
108s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
02/03/2025, 17:08
Behavioral task
behavioral1
Sample
JaffaCakes118_417893911eabbdce7ecf0996b41c6b65.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_417893911eabbdce7ecf0996b41c6b65.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_417893911eabbdce7ecf0996b41c6b65.dll
-
Size
372KB
-
MD5
417893911eabbdce7ecf0996b41c6b65
-
SHA1
b83133af6454beab7c3a6603a8efdc81457d08b0
-
SHA256
36484ef0c87b8f698390365d5dc857b89204096d6e6ebd0a5302e7f58c238519
-
SHA512
7df847e986accd1e1110fea29a25a822416f11dc39735d1f7d8980db2a667151a6078661de6edf903f53dea74dd63777f7784d067a3ede7dd9b2a7543fb314ed
-
SSDEEP
6144:/rQCe8R669RsInCt3TBljn97HOsGc11Ll9s:/rQtboRsIW3T3hjOsGcrXs
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 3496 2136 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2136 1872 rundll32.exe 89 PID 1872 wrote to memory of 2136 1872 rundll32.exe 89 PID 1872 wrote to memory of 2136 1872 rundll32.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_417893911eabbdce7ecf0996b41c6b65.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_417893911eabbdce7ecf0996b41c6b65.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 6203⤵
- Program crash
PID:3496
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2136 -ip 21361⤵PID:2160