Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2025, 00:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_412b509abe1fad2154f0b023de2e9505.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_412b509abe1fad2154f0b023de2e9505.dll
-
Size
835KB
-
MD5
412b509abe1fad2154f0b023de2e9505
-
SHA1
65c400ffd6a088aadd186a292d9e3f0321f2d28d
-
SHA256
39e62a231bab84921afd32ba1e12d7501f94c2b8665ba63eca4b6c930423d579
-
SHA512
37baa28cdd8ba7a087a6ff9e7182b1dea49498bd38673f3f793c3cb9319e47c3c35e59c699c6b6cc0ad7aa7ef4ca6b3116b331f4e1992f0e93183023f6b0a29d
-
SSDEEP
12288:mE7NiOLg18+1/hv5VEipyz7mTWWa8afR2ftuD1xbmiULIjpkyGWi9:mE3+F5GipwuWWpj+0ygWM
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Sality family
-
Executes dropped EXE 1 IoCs
pid Process 4996 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000c000000023ba0-3.dat upx behavioral2/memory/4996-4-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/4996-8-0x0000000000400000-0x000000000047A000-memory.dmp upx behavioral2/memory/4996-9-0x00000000021F0000-0x0000000003220000-memory.dmp upx behavioral2/memory/4996-11-0x00000000021F0000-0x0000000003220000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3252 2036 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 928 wrote to memory of 2036 928 rundll32.exe 83 PID 928 wrote to memory of 2036 928 rundll32.exe 83 PID 928 wrote to memory of 2036 928 rundll32.exe 83 PID 2036 wrote to memory of 4996 2036 rundll32.exe 84 PID 2036 wrote to memory of 4996 2036 rundll32.exe 84 PID 2036 wrote to memory of 4996 2036 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_412b509abe1fad2154f0b023de2e9505.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_412b509abe1fad2154f0b023de2e9505.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4996
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 6083⤵
- Program crash
PID:3252
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2036 -ip 20361⤵PID:4768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248KB
MD54e0a3f0671b99925beda87029d978878
SHA1d73f392eb8c2c8034386bc6c819bcffaf63dc9a6
SHA2562d976b3ed36fce1b3973374a4ca3d725126f8357d7dd913ac2c6b91a1e9dc115
SHA512a5321322da086a72628944e65fd8d313c3964dd71a2b62ccaf156fc34350d26015336e3564fdd79c97d95e6f9b0ee92450d2cc816b48579e530c3caedb8910fc