Analysis
-
max time kernel
131s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 16:13
Static task
static1
Behavioral task
behavioral1
Sample
dc965d0ee4b7f287a32434555999cfc2_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
dc965d0ee4b7f287a32434555999cfc2_JaffaCakes118.dll
-
Size
140KB
-
MD5
dc965d0ee4b7f287a32434555999cfc2
-
SHA1
d6e0fca562c5dd5221e12f856c63d01cb7f4899f
-
SHA256
0e469078fd75786d027048ab12a7ace7dbd14ec4bba06878d5e3b49789ce75bf
-
SHA512
37dc2a2142c5cb98af17985640828f8ddd8b301c23891b5925135134cd7063808102269191a9d43f780428f97cf841d1dff64e006f2e739d5ad0abad34f10498
-
SSDEEP
1536:O6lIdSDpYJely6PxY2ilJ2+wUaXfjpnZ85FYnHulJMpXDFQ0ykAJX14aW/SHabML:qdSd06FilwffjVA0YaDQ0gl2aHhmhu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 652 rundll32mgr.exe -
resource yara_rule behavioral2/files/0x000900000002360b-4.dat upx behavioral2/memory/652-5-0x0000000000400000-0x000000000046E000-memory.dmp upx behavioral2/memory/652-8-0x0000000000400000-0x000000000046E000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2168 652 WerFault.exe 91 3192 4284 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3396 wrote to memory of 4284 3396 rundll32.exe 90 PID 3396 wrote to memory of 4284 3396 rundll32.exe 90 PID 3396 wrote to memory of 4284 3396 rundll32.exe 90 PID 4284 wrote to memory of 652 4284 rundll32.exe 91 PID 4284 wrote to memory of 652 4284 rundll32.exe 91 PID 4284 wrote to memory of 652 4284 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc965d0ee4b7f287a32434555999cfc2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc965d0ee4b7f287a32434555999cfc2_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 2644⤵
- Program crash
PID:2168
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 6083⤵
- Program crash
PID:3192
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 652 -ip 6521⤵PID:2508
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4284 -ip 42841⤵PID:1756
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4300,i,2904906934812054273,11716976550456127484,262144 --variations-seed-version --mojo-platform-channel-handle=1424 /prefetch:81⤵PID:3688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD59b49fec7e03c33277f188a2819b8d726
SHA1a7b6b4a0ecbeab9075c3e36ec2586ce8debbbc4f
SHA2569d3a78f72dbd7351a999d6fd6f60b0c6ba79bc4279a347fd590af94a0224afad
SHA512049a0971913562ca8a134ac889d4750c71d89fe070fadcb06dfc49401f1b9b508275921e55f3f27a31f34d520e96784d4a50959fa1aab6bad878e9e5ea61755d