Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 04:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_473d0eea52e4c9128926811065a55b60.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_473d0eea52e4c9128926811065a55b60.dll
-
Size
223KB
-
MD5
473d0eea52e4c9128926811065a55b60
-
SHA1
06c1db283660dd057bf846aa6cb444b74c25eb0f
-
SHA256
85091bfad769f95f9048f3b81845fc470c37adcd667a18b6226c47e91de7604a
-
SHA512
52e7f78330d42c768304c86664fb9fa7029517f7025334ac345b9116ec572938eba1cd882ee3955c94afc297e5da748cd4cddf49851a1cfa8596480860c5c08f
-
SSDEEP
3072:qmY2UXXqE+A6/Q2BBzrwj9o+vNNbbVweMh5R0MgTBqCxjdaK+3xPWzgjLwwEJo+j:YKEaXwj7BMhv0JBhjgK+pWBui+8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2688 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 3052 rundll32.exe 3052 rundll32.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2732 2688 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3052 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2328 wrote to memory of 3052 2328 rundll32.exe 30 PID 2328 wrote to memory of 3052 2328 rundll32.exe 30 PID 2328 wrote to memory of 3052 2328 rundll32.exe 30 PID 2328 wrote to memory of 3052 2328 rundll32.exe 30 PID 2328 wrote to memory of 3052 2328 rundll32.exe 30 PID 2328 wrote to memory of 3052 2328 rundll32.exe 30 PID 2328 wrote to memory of 3052 2328 rundll32.exe 30 PID 3052 wrote to memory of 2688 3052 rundll32.exe 31 PID 3052 wrote to memory of 2688 3052 rundll32.exe 31 PID 3052 wrote to memory of 2688 3052 rundll32.exe 31 PID 3052 wrote to memory of 2688 3052 rundll32.exe 31 PID 2688 wrote to memory of 2732 2688 rundll32mgr.exe 32 PID 2688 wrote to memory of 2732 2688 rundll32mgr.exe 32 PID 2688 wrote to memory of 2732 2688 rundll32mgr.exe 32 PID 2688 wrote to memory of 2732 2688 rundll32mgr.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_473d0eea52e4c9128926811065a55b60.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_473d0eea52e4c9128926811065a55b60.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 1524⤵
- Loads dropped DLL
- Program crash
PID:2732
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD5d26092af969610dab56e02649ecae88d
SHA1cd450ff4b645acd188fa1f9e9c16a972c0e99f87
SHA256e4fedb771fd949517cbf3392c9f36be599bf16726a4702cb960a1f4845c39a71
SHA5128c87bf4318089dc03d7c60b1d1f04ac46333f792ca37bd3a0ca832dc22ae56dc8b0a473154706ef58812c70cf99d6fee877ab4984ce973eaaa3e5d1525730b05