Analysis
-
max time kernel
92s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 09:53
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_50965d7ba9745f2fbf2515c93a687138.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_50965d7ba9745f2fbf2515c93a687138.dll
-
Size
436KB
-
MD5
50965d7ba9745f2fbf2515c93a687138
-
SHA1
8f1d9ee570dc8565ba01bb7854d9b20811bc81d7
-
SHA256
030cbcb5c2acd6b5d27cff413f1535397a87fc61758c6ea42d0dae65a850aa5f
-
SHA512
a3f4e46ab4b54fb36706bb714ec17e2fb8abb07e3bd5c5eda530a63a1b22e4a7c8b6205b69983ec0a680b735f35abc696953558f85d12a4a3950835f494a0d9f
-
SSDEEP
6144:4XX8bwYYacq/tX2Qjkjjdt3r8cOosiugybxFJ6W5:aMq2N2QjkjvNuZgW5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 964 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000c000000023ba4-3.dat upx behavioral2/memory/964-4-0x0000000000400000-0x0000000000470000-memory.dmp upx behavioral2/memory/964-9-0x0000000000400000-0x0000000000470000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 1164 964 WerFault.exe 86 3672 3424 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1560 wrote to memory of 3424 1560 rundll32.exe 85 PID 1560 wrote to memory of 3424 1560 rundll32.exe 85 PID 1560 wrote to memory of 3424 1560 rundll32.exe 85 PID 3424 wrote to memory of 964 3424 rundll32.exe 86 PID 3424 wrote to memory of 964 3424 rundll32.exe 86 PID 3424 wrote to memory of 964 3424 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50965d7ba9745f2fbf2515c93a687138.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_50965d7ba9745f2fbf2515c93a687138.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 964 -s 2644⤵
- Program crash
PID:1164
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 6203⤵
- Program crash
PID:3672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3424 -ip 34241⤵PID:1988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 964 -ip 9641⤵PID:5088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
220KB
MD51b7fc3fa0a84470506c3028b48a5f04d
SHA13fa9f258fd20c92c0dd366f1520d44f61e236d3b
SHA2569f62f582fc02ae7b3b5df9a8a90718a80773eed10828014cee2a938976ab056b
SHA5121259215288d11be9493abc5d9babec8ff2563be3ed1aaf47fbda3f5832d7604f4f5956d09a06854ff133fb9e0971ac398966c46c743dee3f0aead6a2d0901c19