Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 18:33
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_60034e92b90b53d335651348520a20c7.dll
Resource
win7-20241023-en
General
-
Target
JaffaCakes118_60034e92b90b53d335651348520a20c7.dll
-
Size
164KB
-
MD5
60034e92b90b53d335651348520a20c7
-
SHA1
288fb9a592ce0e7d443876f0a7b82b4b73746dbb
-
SHA256
dc754d725ab21ad99acd57d86371720e309b7ecaec209a47e7e31eef5657e70a
-
SHA512
ed2036cf1631beb3dad26e4206fb7ec10fb010fc3f21be67ced04042daf4187d1bf8039ad355d29e14a1c4b013a035bde27b3f9b902d884ba192de85030d4861
-
SSDEEP
3072:eMFU3pb7H58PXlboF8BTaUjawdTH1X6eNomDtIf8KEG:5ekVPTtVX6co50K1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1884 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 1464 rundll32.exe 1464 rundll32.exe 2508 WerFault.exe 2508 WerFault.exe 2508 WerFault.exe 2508 WerFault.exe 2508 WerFault.exe 2508 WerFault.exe 2508 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2508 1884 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 848 wrote to memory of 1464 848 rundll32.exe 30 PID 848 wrote to memory of 1464 848 rundll32.exe 30 PID 848 wrote to memory of 1464 848 rundll32.exe 30 PID 848 wrote to memory of 1464 848 rundll32.exe 30 PID 848 wrote to memory of 1464 848 rundll32.exe 30 PID 848 wrote to memory of 1464 848 rundll32.exe 30 PID 848 wrote to memory of 1464 848 rundll32.exe 30 PID 1464 wrote to memory of 1884 1464 rundll32.exe 31 PID 1464 wrote to memory of 1884 1464 rundll32.exe 31 PID 1464 wrote to memory of 1884 1464 rundll32.exe 31 PID 1464 wrote to memory of 1884 1464 rundll32.exe 31 PID 1884 wrote to memory of 2508 1884 rundll32mgr.exe 32 PID 1884 wrote to memory of 2508 1884 rundll32mgr.exe 32 PID 1884 wrote to memory of 2508 1884 rundll32mgr.exe 32 PID 1884 wrote to memory of 2508 1884 rundll32mgr.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60034e92b90b53d335651348520a20c7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60034e92b90b53d335651348520a20c7.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1884 -s 924⤵
- Loads dropped DLL
- Program crash
PID:2508
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5aea1462e5f1f31dd74df7833b5a07305
SHA1cea53b9b3311f1003df5d9266f9e3fbd5c971f28
SHA25662c957db467d22cf12af74a4dae478e7d239ecae5d53f3c6399583f38f5224af
SHA512776eeffb068df67e852191f5ec869df6e4cb6c4f14dbe8748cf6b3f9aad2f3b09baa7c61285cb5a5f1253b5bd9525470a25ca77fbe2d26ed02ae7d955142970e