Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 00:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_412b509abe1fad2154f0b023de2e9505.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_412b509abe1fad2154f0b023de2e9505.dll
-
Size
835KB
-
MD5
412b509abe1fad2154f0b023de2e9505
-
SHA1
65c400ffd6a088aadd186a292d9e3f0321f2d28d
-
SHA256
39e62a231bab84921afd32ba1e12d7501f94c2b8665ba63eca4b6c930423d579
-
SHA512
37baa28cdd8ba7a087a6ff9e7182b1dea49498bd38673f3f793c3cb9319e47c3c35e59c699c6b6cc0ad7aa7ef4ca6b3116b331f4e1992f0e93183023f6b0a29d
-
SSDEEP
12288:mE7NiOLg18+1/hv5VEipyz7mTWWa8afR2ftuD1xbmiULIjpkyGWi9:mE3+F5GipwuWWpj+0ygWM
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2580 rundll32mgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2384 rundll32.exe 2384 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral1/files/0x000e000000012267-3.dat upx behavioral1/memory/2580-13-0x0000000000400000-0x000000000047A000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2092 2384 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1688 wrote to memory of 2384 1688 rundll32.exe 30 PID 1688 wrote to memory of 2384 1688 rundll32.exe 30 PID 1688 wrote to memory of 2384 1688 rundll32.exe 30 PID 1688 wrote to memory of 2384 1688 rundll32.exe 30 PID 1688 wrote to memory of 2384 1688 rundll32.exe 30 PID 1688 wrote to memory of 2384 1688 rundll32.exe 30 PID 1688 wrote to memory of 2384 1688 rundll32.exe 30 PID 2384 wrote to memory of 2580 2384 rundll32.exe 31 PID 2384 wrote to memory of 2580 2384 rundll32.exe 31 PID 2384 wrote to memory of 2580 2384 rundll32.exe 31 PID 2384 wrote to memory of 2580 2384 rundll32.exe 31 PID 2384 wrote to memory of 2092 2384 rundll32.exe 32 PID 2384 wrote to memory of 2092 2384 rundll32.exe 32 PID 2384 wrote to memory of 2092 2384 rundll32.exe 32 PID 2384 wrote to memory of 2092 2384 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_412b509abe1fad2154f0b023de2e9505.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_412b509abe1fad2154f0b023de2e9505.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
PID:2580
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 2243⤵
- Program crash
PID:2092
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD54e0a3f0671b99925beda87029d978878
SHA1d73f392eb8c2c8034386bc6c819bcffaf63dc9a6
SHA2562d976b3ed36fce1b3973374a4ca3d725126f8357d7dd913ac2c6b91a1e9dc115
SHA512a5321322da086a72628944e65fd8d313c3964dd71a2b62ccaf156fc34350d26015336e3564fdd79c97d95e6f9b0ee92450d2cc816b48579e530c3caedb8910fc