Overview
overview
10Static
static
3JaffaCakes...11.exe
windows10-2004-x64
8ADVPACK.dll
windows10-2004-x64
3W95INF16.dll
windows10-2004-x64
1W95INF32.dll
windows10-2004-x64
3fngrprnt.dll
windows10-2004-x64
3msnphoto.scr
windows10-2004-x64
3msvcr71.dll
windows10-2004-x64
3pibase.dll
windows10-2004-x64
3pidav.dll
windows10-2004-x64
3piorg.dll
windows10-2004-x64
3piorgres.dll
windows10-2004-x64
1pisync.dll
windows10-2004-x64
3pisynctw.exe
windows10-2004-x64
3piview.dll
windows10-2004-x64
3slides~1.js
windows10-2004-x64
10startup.js
windows10-2004-x64
3unicows.dll
windows10-2004-x64
3Analysis
-
max time kernel
102s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250502-en -
resource tags
arch:x64arch:x86image:win10v2004-20250502-enlocale:en-usos:windows10-2004-x64system -
submitted
18/05/2025, 03:21
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_067352f5a9f5905b21b82b18e9fa2711.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
ADVPACK.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral3
Sample
W95INF16.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral4
Sample
W95INF32.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral5
Sample
fngrprnt.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral6
Sample
msnphoto.scr
Resource
win10v2004-20250502-en
Behavioral task
behavioral7
Sample
msvcr71.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral8
Sample
pibase.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral9
Sample
pidav.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral10
Sample
piorg.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral11
Sample
piorgres.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral12
Sample
pisync.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral13
Sample
pisynctw.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral14
Sample
piview.dll
Resource
win10v2004-20250502-en
Behavioral task
behavioral15
Sample
slides~1.js
Resource
win10v2004-20250502-en
Behavioral task
behavioral16
Sample
startup.js
Resource
win10v2004-20250502-en
Behavioral task
behavioral17
Sample
unicows.dll
Resource
win10v2004-20250502-en
General
-
Target
msvcr71.dll
-
Size
340KB
-
MD5
86f1895ae8c5e8b17d99ece768a70732
-
SHA1
d5502a1d00787d68f548ddeebbde1eca5e2b38ca
-
SHA256
8094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe
-
SHA512
3b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da
-
SSDEEP
6144:OcV9z83OtqxnEYmt3NEnvfF+Tbmbw6An8FMciFMNrb3YgxxpbCAOxO2ElvlE:Ooz83OtIEzW+/m/AyF7bCrO/E
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 2120 4384 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4644 wrote to memory of 4384 4644 rundll32.exe 85 PID 4644 wrote to memory of 4384 4644 rundll32.exe 85 PID 4644 wrote to memory of 4384 4644 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msvcr71.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\msvcr71.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4384 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4384 -s 6003⤵
- Program crash
PID:2120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4384 -ip 43841⤵PID:1124