Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 22:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_60f3dfcdc854e97447a325fe4beaa609.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_60f3dfcdc854e97447a325fe4beaa609.dll
-
Size
724KB
-
MD5
60f3dfcdc854e97447a325fe4beaa609
-
SHA1
249ac6f89790573097046e5b0fee55bb0db7005e
-
SHA256
2832da6320014e9d439375b17aebeb7188ce3c7f82960d50c13c38f33fdbd933
-
SHA512
4069d05022be30812b26b2ece76639e3d823ca1b0de648236088869552b13ce04527e87465c33b95c1c07c11b23bd6bba3f50c0b44d19160a6f53232888b96a7
-
SSDEEP
12288:SE7NiOLg18+1/hv5VEipyz7mTWWa8afR2ftuD1xbmiU7+diwR19kN9G:SE3+F5GipwuWWpj+BNkXG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4456 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000c000000023b43-3.dat upx behavioral2/memory/4456-5-0x0000000000400000-0x000000000048F000-memory.dmp upx behavioral2/memory/4456-7-0x0000000000400000-0x000000000048F000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 1780 5040 WerFault.exe 82 4008 4456 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1496 wrote to memory of 5040 1496 rundll32.exe 82 PID 1496 wrote to memory of 5040 1496 rundll32.exe 82 PID 1496 wrote to memory of 5040 1496 rundll32.exe 82 PID 5040 wrote to memory of 4456 5040 rundll32.exe 83 PID 5040 wrote to memory of 4456 5040 rundll32.exe 83 PID 5040 wrote to memory of 4456 5040 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60f3dfcdc854e97447a325fe4beaa609.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60f3dfcdc854e97447a325fe4beaa609.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 2644⤵
- Program crash
PID:4008
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 6083⤵
- Program crash
PID:1780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5040 -ip 50401⤵PID:5064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4456 -ip 44561⤵PID:1332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5b82a555fd9de0d736a97cd10a7e100e1
SHA148e4c1531efdc1ad03d00305c374c79bfebe2c23
SHA256e9a820755860e1c036b769a45dd9302984bcd759de69bcdbdd25515ddad867e8
SHA5125cf8df4c6bfc2008cdc3a53887945ac23fd3fba348b6dc1ca44f421cfcdf1fafa83d0519a4c6fa37280f2eb3680fe982c2e918ae0abaec434f498d9656e28a63