Analysis
-
max time kernel
92s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
0200557e45133b8e58841b36be401e00_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
0200557e45133b8e58841b36be401e00_JaffaCakes118.dll
-
Size
343KB
-
MD5
0200557e45133b8e58841b36be401e00
-
SHA1
d2870cbeb09754804deb00ead0db443668064afd
-
SHA256
952b976758c83fa247f417fb3195277c1522222a92a897a7f8ed66d74bde7ecd
-
SHA512
ffcd3ba30fa7f2b6a8abe767ca851759dba8ac811bdcc952ad7c26275609c645747892a5f09be0f543e09d01f2cdb38121acaab686cb2feeb9f4f0a4d73210ba
-
SSDEEP
6144:pMJOWK4l0wqOVq1ZweJ2L9Y+fJsaosgF315PjWGpNcAlURB:p2OWK4llnZY+ms015PjlpyEUf
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4756 rundll32mgr.exe 2156 rundll32mgrmgr.exe -
Loads dropped DLL 2 IoCs
pid Process 4756 rundll32mgr.exe 2156 rundll32mgrmgr.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\rundll32mgrmgr.exe rundll32mgr.exe -
resource yara_rule behavioral2/memory/2156-14-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral2/memory/4756-12-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 3212 4756 WerFault.exe 83 1088 2156 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgrmgr.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 556 wrote to memory of 3928 556 rundll32.exe 82 PID 556 wrote to memory of 3928 556 rundll32.exe 82 PID 556 wrote to memory of 3928 556 rundll32.exe 82 PID 3928 wrote to memory of 4756 3928 rundll32.exe 83 PID 3928 wrote to memory of 4756 3928 rundll32.exe 83 PID 3928 wrote to memory of 4756 3928 rundll32.exe 83 PID 4756 wrote to memory of 2156 4756 rundll32mgr.exe 84 PID 4756 wrote to memory of 2156 4756 rundll32mgr.exe 84 PID 4756 wrote to memory of 2156 4756 rundll32mgr.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0200557e45133b8e58841b36be401e00_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0200557e45133b8e58841b36be401e00_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\rundll32mgrmgr.exeC:\Windows\SysWOW64\rundll32mgrmgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 101765⤵
- Program crash
PID:1088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 101844⤵
- Program crash
PID:3212
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 2156 -ip 21561⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4756 -ip 47561⤵PID:2380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
191KB
MD5d3d9e83859d00c69a12e334852e0e40e
SHA188b6d73a9a92b96f017417e346781aa62e412112
SHA2563b50ec5daef877dabead21459e6e6dd8de74ea4fbdaf1163768e0376b4060887
SHA5123f565d70caa9139068468cb296f15a05d5921d01362f04bb2996007683bf8816dbc6338283acba22d8349c1214c98bddb476fef3878b97f555acd46ac8754fe2
-
Filesize
94KB
MD58abf6898662a995642dd979ff1fe5eef
SHA108aeda19120993801a6f3a8aa2b73b559ed361ad
SHA2568aa6d0613c1ad6326d92678bc90dd10be1fba7a5b5f9d7a4a6fac6a42baf94cb
SHA512a1e88bde3478d8a0c74824998b13e1fdf4484eec444540352076acc43675ecd2daed86e719b3889e7e8ce2104b2b7259a237b42d474acbca8f7e7fb3f37a3313