Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 22:47
Static task
static1
Behavioral task
behavioral1
Sample
fd69ce71d5c0f7df5bc39843f6db52c0_JaffaCakes118.dll
Resource
win7-20241010-en
General
-
Target
fd69ce71d5c0f7df5bc39843f6db52c0_JaffaCakes118.dll
-
Size
123KB
-
MD5
fd69ce71d5c0f7df5bc39843f6db52c0
-
SHA1
2a58116ba8738dba53cff79533b8366f9e3d3530
-
SHA256
b079a80415982a8aa3daa150953b48701d7502aa58e1d562de8f911c132f10b0
-
SHA512
5cf0bc4e465b11b8b06f0d4302d04b19d0b74ef477b9dbcf7e86a8f728cbdc3ae83e62b2df1ae68c26047ac6f8b9bba9c1131317f35b1c679e4491275fbb6974
-
SSDEEP
1536:+k4CEi1tQDbHLiYXGsnv5u3lFf7A0jbgEQ277yKPJe6TL:+k4CEi1giwzvE7fLbaKJL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2560 regsvr32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 2556 regsvr32.exe 2556 regsvr32.exe 1472 WerFault.exe 1472 WerFault.exe 1472 WerFault.exe 1472 WerFault.exe 1472 WerFault.exe 1472 WerFault.exe 1472 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1472 2560 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32mgr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2556 2100 regsvr32.exe 30 PID 2100 wrote to memory of 2556 2100 regsvr32.exe 30 PID 2100 wrote to memory of 2556 2100 regsvr32.exe 30 PID 2100 wrote to memory of 2556 2100 regsvr32.exe 30 PID 2100 wrote to memory of 2556 2100 regsvr32.exe 30 PID 2100 wrote to memory of 2556 2100 regsvr32.exe 30 PID 2100 wrote to memory of 2556 2100 regsvr32.exe 30 PID 2556 wrote to memory of 2560 2556 regsvr32.exe 31 PID 2556 wrote to memory of 2560 2556 regsvr32.exe 31 PID 2556 wrote to memory of 2560 2556 regsvr32.exe 31 PID 2556 wrote to memory of 2560 2556 regsvr32.exe 31 PID 2560 wrote to memory of 1472 2560 regsvr32mgr.exe 32 PID 2560 wrote to memory of 1472 2560 regsvr32mgr.exe 32 PID 2560 wrote to memory of 1472 2560 regsvr32mgr.exe 32 PID 2560 wrote to memory of 1472 2560 regsvr32mgr.exe 32
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\fd69ce71d5c0f7df5bc39843f6db52c0_JaffaCakes118.dll1⤵
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\fd69ce71d5c0f7df5bc39843f6db52c0_JaffaCakes118.dll2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2560 -s 1004⤵
- Loads dropped DLL
- Program crash
PID:1472
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5242f5fffb519c398b15866ca79206620
SHA148a4f008d6c304992499f820ebc7a707e358545e
SHA2560c8b4e7d06339dadeb05599c49e3e167bb1bc9153b418fdcf37e9e4e2622cbf6
SHA512d7b86f66e11a6eea286ac2d911241c336c703c30a8f343529fdb1323b1c724f3fd8d19a8f76b998a57c04ca317681f5d99066c8fafabce2ff445599fbce5bc47