Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 03:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_029cbc64802dae15d6ded5e295a7e323.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_029cbc64802dae15d6ded5e295a7e323.dll
-
Size
359KB
-
MD5
029cbc64802dae15d6ded5e295a7e323
-
SHA1
d68e2006c01b08bc8f6cd9ee3d40077ab94959c1
-
SHA256
0b696bbab11d388e64ac725eefaf902388c366d0e16e831adb7fa94df04578b5
-
SHA512
8dbbbc50725909108b199b9e4ef996b68c8e2ccc3caaa85bacb71fd7f4c3934268e045d9b13eccb36bdceda4c802a1775aafea332f1096e1de8cf6e28caee450
-
SSDEEP
3072:EOBOLWXivHYMzv2HvP5YeBTEEP2831Vr/rF8QOSta7WeKwkB5fK4MmC896KA3wc+:EOp8HpzdQOStKpkB5fMZ2lJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3588 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000d000000023bb2-4.dat upx behavioral2/memory/3588-5-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/3588-7-0x0000000000400000-0x0000000000498000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 5012 3588 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4196 wrote to memory of 4304 4196 rundll32.exe 82 PID 4196 wrote to memory of 4304 4196 rundll32.exe 82 PID 4196 wrote to memory of 4304 4196 rundll32.exe 82 PID 4304 wrote to memory of 3588 4304 rundll32.exe 83 PID 4304 wrote to memory of 3588 4304 rundll32.exe 83 PID 4304 wrote to memory of 3588 4304 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_029cbc64802dae15d6ded5e295a7e323.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_029cbc64802dae15d6ded5e295a7e323.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 2644⤵
- Program crash
PID:5012
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3588 -ip 35881⤵PID:4780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260KB
MD538d0789db4ebd651202667a393edda52
SHA193345be068c4cee6f41f0dd01460161224e1290a
SHA2561c90372a12e36fd370126700cf4e222f33044ca406e88925952a236147ceda61
SHA51291431aaac4bcc3ab3f3d68f3da7a54e9b880f245a4e4ffb573351fd5d74c6894025c373c57eebff50ffccd3aa09d4416ed20bdf8d8e4c6c309746fd7940f4dd1