Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 11:43
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_53c7db52af5bd29f832f435d4bacfe30.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_53c7db52af5bd29f832f435d4bacfe30.dll
-
Size
524KB
-
MD5
53c7db52af5bd29f832f435d4bacfe30
-
SHA1
bb803b987c0ea79fd4887dafa9c1eef11e176b3a
-
SHA256
7363886e017a69013eb9b8a70a1086518e9505567107d4669380e79c1fe0092b
-
SHA512
eeeae73a21dbf6aa2c809d47c72cb33a9c499d91fdeea69817a4385e0387ccad1cfd6f25c70d08fe73d99c22dd2b84041a6b5f80e0d0af13c0b3fb936bbc71e0
-
SSDEEP
12288:iV7LMzw56Wx1Dk/qon6xyYhgPFaUVltjsHIZsCuGd:01oC3yWgPFGHI2a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2584 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000c000000023b1b-3.dat upx behavioral2/memory/2584-4-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2584-7-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4520 2584 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 384 wrote to memory of 1468 384 rundll32.exe 82 PID 384 wrote to memory of 1468 384 rundll32.exe 82 PID 384 wrote to memory of 1468 384 rundll32.exe 82 PID 1468 wrote to memory of 2584 1468 rundll32.exe 83 PID 1468 wrote to memory of 2584 1468 rundll32.exe 83 PID 1468 wrote to memory of 2584 1468 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53c7db52af5bd29f832f435d4bacfe30.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_53c7db52af5bd29f832f435d4bacfe30.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 2644⤵
- Program crash
PID:4520
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2584 -ip 25841⤵PID:4088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD512d840fc0b79a745c013e73c4c470467
SHA1f47b3c28974d6199e596c365f5e7161656480100
SHA2567ee9098ea2bc30eaea20eceb5e8cda620772c4ba2d7d6945e34ea93fb6054ccb
SHA512de5f3cb695f1a10d897968668ea403721e09f9c66db796d932b8152edb1681dbac777efb63a2cff9d81380d09452f90470a8b77363a99f21421b9ff61fcb930a