Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 20:02
Behavioral task
behavioral1
Sample
JaffaCakes118_60639c4af77fcf21bf20fbefb3142eec.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_60639c4af77fcf21bf20fbefb3142eec.dll
-
Size
234KB
-
MD5
60639c4af77fcf21bf20fbefb3142eec
-
SHA1
73dde4fc639c9ec2c42520abaa456e99ccb4badc
-
SHA256
33672666a53edab174939f0484c0cd59dc627ff56f8a2907412ba0b616e7a74a
-
SHA512
7c0c1555ab8dcf2c999f46f09091123bd3fe0da2d5971fe9c7280e53037cfa004185278a532380c0617dc1b6c3188b201432e0248ec1ff3a47458bfb69f287f5
-
SSDEEP
6144:aE1bwNNeYIJM1/9p3miMIUq4VVnlHicTMx2EPBCJ:ixhmiMtqCVlr+JCJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4556 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/memory/2472-1-0x0000000010000000-0x000000001004E000-memory.dmp upx behavioral2/files/0x000c000000023b9a-4.dat upx behavioral2/memory/4556-5-0x0000000000400000-0x0000000000489000-memory.dmp upx behavioral2/memory/4556-7-0x0000000000400000-0x0000000000489000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3208 4556 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2472 1520 rundll32.exe 82 PID 1520 wrote to memory of 2472 1520 rundll32.exe 82 PID 1520 wrote to memory of 2472 1520 rundll32.exe 82 PID 2472 wrote to memory of 4556 2472 rundll32.exe 83 PID 2472 wrote to memory of 4556 2472 rundll32.exe 83 PID 2472 wrote to memory of 4556 2472 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60639c4af77fcf21bf20fbefb3142eec.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_60639c4af77fcf21bf20fbefb3142eec.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4556 -s 4724⤵
- Program crash
PID:3208
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 4556 -ip 45561⤵PID:2948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5053349d7ad422a413294766d79fc0b14
SHA1b3bd239f6d8de5d82945d4063161b06ff932ac67
SHA2562aae02cbc873fd41602e7f69427602d3c7062ad62bf0cdb64df3502cc372905c
SHA5123f6ae5958dff78194f1a730db94603bd0d88aa9a33c8ffb62dbe3a1b583b86b638bc017b9cb2a2f368815e00750e12d80be287ac77f4a15afbb7603fee1c154e