Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
10/03/2025, 07:14
Behavioral task
behavioral1
Sample
JaffaCakes118_5dc1c8c0a584900ff90aabf87c6a2548.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5dc1c8c0a584900ff90aabf87c6a2548.dll
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5dc1c8c0a584900ff90aabf87c6a2548.dll
-
Size
504KB
-
MD5
5dc1c8c0a584900ff90aabf87c6a2548
-
SHA1
bfcfbb48b7a0fb5c701581b1ef0b46e859ddb659
-
SHA256
9c8c7e4522bc34dae092a974d7b2f0c18cf697ec1eed2c4511fee0335979a4f2
-
SHA512
b514c0aa2dbc26a7cc74522c4d393fb8aefc2341bfe13fdc54623a0bc0dcc65aedfc6b568f512cd918416ffdc3acac20cf95efc1e19a92fbd8d5277569ce824f
-
SSDEEP
3072:Mp6s+wuAhRfhqt7sOD7Yq7QltTYfTBftvchUn6nbknBrmzhoFMH7An6f8:MIsxp4tlYuQLYfTBlEhUn6nyBm+KHc60
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2240 1668 WerFault.exe 28 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1964 wrote to memory of 1668 1964 rundll32.exe 28 PID 1964 wrote to memory of 1668 1964 rundll32.exe 28 PID 1964 wrote to memory of 1668 1964 rundll32.exe 28 PID 1964 wrote to memory of 1668 1964 rundll32.exe 28 PID 1964 wrote to memory of 1668 1964 rundll32.exe 28 PID 1964 wrote to memory of 1668 1964 rundll32.exe 28 PID 1964 wrote to memory of 1668 1964 rundll32.exe 28 PID 1668 wrote to memory of 2240 1668 rundll32.exe 29 PID 1668 wrote to memory of 2240 1668 rundll32.exe 29 PID 1668 wrote to memory of 2240 1668 rundll32.exe 29 PID 1668 wrote to memory of 2240 1668 rundll32.exe 29
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5dc1c8c0a584900ff90aabf87c6a2548.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5dc1c8c0a584900ff90aabf87c6a2548.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 2243⤵
- Program crash
PID:2240
-
-