Analysis
-
max time kernel
130s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 13:34
Static task
static1
Behavioral task
behavioral1
Sample
c0db15a9014a813adadb2605cfa57a44_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
c0db15a9014a813adadb2605cfa57a44_JaffaCakes118.dll
-
Size
364KB
-
MD5
c0db15a9014a813adadb2605cfa57a44
-
SHA1
c3cb061fda1b12078648cc72e265453e1ac7d779
-
SHA256
58af4051481e13f444bdcba0f9162686afa2a28df81f309d99d1406dbc5449ad
-
SHA512
945bd31bba98ef12a9c6ddfc856f923f5f169fe4010fd5af790b1165bb12e76ccee49c3fb1db52e950639c90c6736f9b7bfbd4f2f5305255b6fa93ddce5e77d8
-
SSDEEP
6144:S0GmlGZIdBKjQTG6xWFrTj0zIRq8GQDXO2oDXqHsEFFAig:0GB7GqWQt2oDylAig
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4392 rundll32mgr.exe -
resource yara_rule behavioral2/files/0x0009000000023479-4.dat upx behavioral2/memory/4392-5-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/4392-8-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 728 1688 WerFault.exe 83 1564 4392 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4736 wrote to memory of 1688 4736 rundll32.exe 83 PID 4736 wrote to memory of 1688 4736 rundll32.exe 83 PID 4736 wrote to memory of 1688 4736 rundll32.exe 83 PID 1688 wrote to memory of 4392 1688 rundll32.exe 84 PID 1688 wrote to memory of 4392 1688 rundll32.exe 84 PID 1688 wrote to memory of 4392 1688 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0db15a9014a813adadb2605cfa57a44_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c0db15a9014a813adadb2605cfa57a44_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4392 -s 2644⤵
- Program crash
PID:1564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 6323⤵
- Program crash
PID:728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1688 -ip 16881⤵PID:3712
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4392 -ip 43921⤵PID:3600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD503458f75016342531765a7def629c6fe
SHA17e14e6534123ce7e51aafa2ccda4688a4524eeaf
SHA256860fdd78a1ca6dd68db4d64b918ef1fea1734a0650d4aad8c159eaf1e41ba98f
SHA5122db0af32ab82875e50d630798ee81b8a6fef9d1fccd6953fb891e6fc07fc048b30e65fd934ad8f6bd1531d7dcb73129043a219e28f82f55497a84b8b5e9ec198