Analysis
-
max time kernel
95s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 00:50
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_4146f629cd05c130cf774f129b372a00.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_4146f629cd05c130cf774f129b372a00.dll
-
Size
152KB
-
MD5
4146f629cd05c130cf774f129b372a00
-
SHA1
b47d8eb4528f24b278f72971c49e07d91409fe03
-
SHA256
a39febd188771cdde3ef57eb9fcf422c9d01c95afd2664145906ca120a231ab5
-
SHA512
ff6821be16e5765e41116600e4faa40deaf7e7bf1184494e37b06b8360421c099171056d3b2b7dd1898e101cdc40a548d4dbb88fa2f9e57bf8059c8e6b8f5862
-
SSDEEP
3072:Un4cV8gf2u41Z5tKlmyUxyIqlKZEtNcmJo2xa:m4y8gOl2IyUMIWvNcZ2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4728 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000b000000023bc3-3.dat upx behavioral2/memory/4728-5-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/4728-8-0x0000000000400000-0x000000000042F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3480 wrote to memory of 1524 3480 rundll32.exe 82 PID 3480 wrote to memory of 1524 3480 rundll32.exe 82 PID 3480 wrote to memory of 1524 3480 rundll32.exe 82 PID 1524 wrote to memory of 4728 1524 rundll32.exe 83 PID 1524 wrote to memory of 4728 1524 rundll32.exe 83 PID 1524 wrote to memory of 4728 1524 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4146f629cd05c130cf774f129b372a00.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4146f629cd05c130cf774f129b372a00.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4728
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD51e28b93df4dc13ba183d7cac665bc45e
SHA19f91ec079b5033516398e65970431602ba51647c
SHA256e6db1aa577d981ff37dffc63cf7496a94db52e27c035f59983236cf1117becaf
SHA512f133fd3ce7ddc48f090f3f94c98ea8b3b6ad017fc774c43d691176fe3f18a499de890be3aaaadd36299df41ea0f705a7375a6772409efccd11991bc49e4d7331