Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 07:40
Static task
static1
Behavioral task
behavioral1
Sample
2d5fef30a933722857943915e915fa36_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
2d5fef30a933722857943915e915fa36_JaffaCakes118.dll
-
Size
267KB
-
MD5
2d5fef30a933722857943915e915fa36
-
SHA1
a18e7d4c971fe989a16106f018df4c85c4d02cc4
-
SHA256
d5d0b1345578ee41d59308f8431d05537364b88b2be6b857489906ed9d285fcb
-
SHA512
a349583f0d166b9359da766ceb9f9202038aa329d1a52719543594501807b98c4c517beda870ef57be001b06e5b53ca4dc60b572ba59a4809d60f72048f4c8f7
-
SSDEEP
3072:C0NbrbkYHUyP9eECVWfpIhbWoVnW6IioARoKO7JurqeBTg4vRP86TvOB5n+90f//:JrkYHjIWeWcd71bynbe05kYv8Y
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4180 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/memory/4180-4-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/files/0x000a000000023c64-3.dat upx behavioral2/memory/4180-8-0x0000000000400000-0x000000000046F000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 4420 3924 WerFault.exe 83 1172 4180 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1756 wrote to memory of 3924 1756 rundll32.exe 83 PID 1756 wrote to memory of 3924 1756 rundll32.exe 83 PID 1756 wrote to memory of 3924 1756 rundll32.exe 83 PID 3924 wrote to memory of 4180 3924 rundll32.exe 84 PID 3924 wrote to memory of 4180 3924 rundll32.exe 84 PID 3924 wrote to memory of 4180 3924 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d5fef30a933722857943915e915fa36_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d5fef30a933722857943915e915fa36_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 2684⤵
- Program crash
PID:1172
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3924 -s 6163⤵
- Program crash
PID:4420
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3924 -ip 39241⤵PID:3396
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4180 -ip 41801⤵PID:4408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5308f9d419f22b2ee22045d8de27f948f
SHA10550f68e09fbb61e19ebb7e538d1967604364453
SHA256776c6ac33fa9b591d2eec946fb666919696845f09a633acfe8606c73e1999901
SHA5128e36baf4c4f5c9f7bc001ae208abaa96a6d7d6e422823105abb1a8dc4a67e94da2506187cfe33929e018b6a88863d2be79057bfb227f56158a4c4a35f5b55ab8