Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 16:03
Static task
static1
Behavioral task
behavioral1
Sample
9c8883a279d061a33d99f98952944e60_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
9c8883a279d061a33d99f98952944e60_JaffaCakes118.dll
-
Size
334KB
-
MD5
9c8883a279d061a33d99f98952944e60
-
SHA1
5ecc504168db6bfbfa6cdb0ec15153b6ac7d3e8f
-
SHA256
e4332b7d06c96d1e80f69d1a0cb30cb9d1ddf3395f925d377067c4be7a9fbb92
-
SHA512
924f346692f1bb81943f910b8b57f36cda6f2d61f3c48e5b1cd2be536514b12df72efdb3006b9f2eb51636a65a85dd57f7b6e8bfc4f885b53fa15b9ad025f21a
-
SSDEEP
6144:+cprDI2F1usOgQa+fENO7NelWxugahfyB8:+cpHIK9HnieGG48
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 580 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 2484 rundll32.exe 2484 rundll32.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe 2056 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2056 580 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2484 2544 rundll32.exe 31 PID 2544 wrote to memory of 2484 2544 rundll32.exe 31 PID 2544 wrote to memory of 2484 2544 rundll32.exe 31 PID 2544 wrote to memory of 2484 2544 rundll32.exe 31 PID 2544 wrote to memory of 2484 2544 rundll32.exe 31 PID 2544 wrote to memory of 2484 2544 rundll32.exe 31 PID 2544 wrote to memory of 2484 2544 rundll32.exe 31 PID 2484 wrote to memory of 580 2484 rundll32.exe 32 PID 2484 wrote to memory of 580 2484 rundll32.exe 32 PID 2484 wrote to memory of 580 2484 rundll32.exe 32 PID 2484 wrote to memory of 580 2484 rundll32.exe 32 PID 580 wrote to memory of 2056 580 rundll32mgr.exe 33 PID 580 wrote to memory of 2056 580 rundll32mgr.exe 33 PID 580 wrote to memory of 2056 580 rundll32mgr.exe 33 PID 580 wrote to memory of 2056 580 rundll32mgr.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c8883a279d061a33d99f98952944e60_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9c8883a279d061a33d99f98952944e60_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 580 -s 1004⤵
- Loads dropped DLL
- Program crash
PID:2056
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD524b21252f3b473034d8225b6abb470ff
SHA1526b83d889ee9996f9efb240c606185571a9b324
SHA2561e8683bf03cf681262a1a0db2f4823471fcc0365fc0645f604b0d1c32dc50bb1
SHA5123059a770b2b7933c2e288387e2b708e4691639013cb4972eb080cc3489f116f29a4e5d579718904b5dea495f8c26940378447864992d973aa57bd58580c54b8f