Analysis
-
max time kernel
94s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 09:27
Static task
static1
Behavioral task
behavioral1
Sample
e0d22cacbb3528701ae70fa8c8a464a8_JaffaCakes118.dll
Resource
win7-20240708-en
General
-
Target
e0d22cacbb3528701ae70fa8c8a464a8_JaffaCakes118.dll
-
Size
222KB
-
MD5
e0d22cacbb3528701ae70fa8c8a464a8
-
SHA1
b0e6997e5508e73a07c532e86e8ea391c1bc7367
-
SHA256
555f1d1171b73f5eae8ab19c3d574c4d1e01c59f3d79595303ffd891fea4c349
-
SHA512
497608652fa9c4d3237d34f616c7d7914820b05ab37d074ba5ef0ebd547b2389d3ad569fa2bd3d28d92b580090c22854377b95b0d3a3ffeb63ccfb039a3d8a83
-
SSDEEP
3072:AQTT2V0qYKm/M8EMXIGXmw/IYGWJ0KtBHQyhOtLDuBwmHbtKwEc5I9UKk3KaO:VTThRM8ZIGXmw/T0KtP8tpQtnIWKj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1172 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000a000000023c0c-2.dat upx behavioral2/memory/1172-4-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/1172-8-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4464 1172 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1564 wrote to memory of 4892 1564 rundll32.exe 83 PID 1564 wrote to memory of 4892 1564 rundll32.exe 83 PID 1564 wrote to memory of 4892 1564 rundll32.exe 83 PID 4892 wrote to memory of 1172 4892 rundll32.exe 84 PID 4892 wrote to memory of 1172 4892 rundll32.exe 84 PID 4892 wrote to memory of 1172 4892 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e0d22cacbb3528701ae70fa8c8a464a8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e0d22cacbb3528701ae70fa8c8a464a8_JaffaCakes118.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1172 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 2644⤵
- Program crash
PID:4464
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1172 -ip 11721⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD512d840fc0b79a745c013e73c4c470467
SHA1f47b3c28974d6199e596c365f5e7161656480100
SHA2567ee9098ea2bc30eaea20eceb5e8cda620772c4ba2d7d6945e34ea93fb6054ccb
SHA512de5f3cb695f1a10d897968668ea403721e09f9c66db796d932b8152edb1681dbac777efb63a2cff9d81380d09452f90470a8b77363a99f21421b9ff61fcb930a