Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
e9b24e07bba059b824fa58cf801a2aa7_JaffaCakes118.dll
Resource
win7-20240903-en
General
-
Target
e9b24e07bba059b824fa58cf801a2aa7_JaffaCakes118.dll
-
Size
660KB
-
MD5
e9b24e07bba059b824fa58cf801a2aa7
-
SHA1
6a5ffe5471823ac27a1d912c9ab4e59ea331b627
-
SHA256
d58dd8cb189cda12ad2aa1913b55ed1e2dd596fa702690a60c04db8aa664396b
-
SHA512
2fb5b065feb03ca416033de18b96116559d4fbe2b14a4ec91d55dee858ba826891af7aa30f22575b69605e33da09deea4b95357fd325da2f3b208ba0cc2d170b
-
SSDEEP
12288:zZL7A5l0711g8onrOcWAqVvrDhS6kNaW3:zZL7AfYhonSr1naaW3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2900 rundll32mgr.exe -
Loads dropped DLL 11 IoCs
pid Process 1864 rundll32.exe 1864 rundll32.exe 2400 WerFault.exe 2400 WerFault.exe 2400 WerFault.exe 2400 WerFault.exe 2400 WerFault.exe 2400 WerFault.exe 2400 WerFault.exe 2400 WerFault.exe 2400 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2848 1864 WerFault.exe 30 2400 2900 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2112 wrote to memory of 1864 2112 rundll32.exe 30 PID 2112 wrote to memory of 1864 2112 rundll32.exe 30 PID 2112 wrote to memory of 1864 2112 rundll32.exe 30 PID 2112 wrote to memory of 1864 2112 rundll32.exe 30 PID 2112 wrote to memory of 1864 2112 rundll32.exe 30 PID 2112 wrote to memory of 1864 2112 rundll32.exe 30 PID 2112 wrote to memory of 1864 2112 rundll32.exe 30 PID 1864 wrote to memory of 2900 1864 rundll32.exe 31 PID 1864 wrote to memory of 2900 1864 rundll32.exe 31 PID 1864 wrote to memory of 2900 1864 rundll32.exe 31 PID 1864 wrote to memory of 2900 1864 rundll32.exe 31 PID 1864 wrote to memory of 2848 1864 rundll32.exe 32 PID 1864 wrote to memory of 2848 1864 rundll32.exe 32 PID 1864 wrote to memory of 2848 1864 rundll32.exe 32 PID 1864 wrote to memory of 2848 1864 rundll32.exe 32 PID 2900 wrote to memory of 2400 2900 rundll32mgr.exe 33 PID 2900 wrote to memory of 2400 2900 rundll32mgr.exe 33 PID 2900 wrote to memory of 2400 2900 rundll32mgr.exe 33 PID 2900 wrote to memory of 2400 2900 rundll32mgr.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e9b24e07bba059b824fa58cf801a2aa7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e9b24e07bba059b824fa58cf801a2aa7_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 1564⤵
- Loads dropped DLL
- Program crash
PID:2400
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 2283⤵
- Program crash
PID:2848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187KB
MD527fdabf7c440551ce0d41832bb40e0e4
SHA1c3a6f07789562c1edbea44197a3f6cb3f6d345c9
SHA25652f26137f9a813c374e5bca7ae97f2f31c1f8084276944fdc5e97df7a69a86c4
SHA5124c13cfe5ed6741933d83ba0af39bd9cc544033328fe015b5ec1f1eff358e54764814f60085c0b4528034e2e8ab2f94694e186b27d9e66e42e01391ba20f38df5