Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/01/2025, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_638c8d56be149f65514cbc3aa88706f0.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_638c8d56be149f65514cbc3aa88706f0.dll
-
Size
256KB
-
MD5
638c8d56be149f65514cbc3aa88706f0
-
SHA1
1402274978db717d48dce7c57f1b2d1c54f058b4
-
SHA256
7f2a814bec6ea582d988824fa4eac80fd42ded6c13875a05e77c4799b861ba2d
-
SHA512
1eabc234f6907fa8db9fb335c5b478a4ffb96fb73c600c0a4243cadff319acd26d1df9267b31bb670ccc8493d11c548e2321cd357cf8a7c930c0fbc1546af06d
-
SSDEEP
3072:UdcQ2ZNMSQvbajUTUItjT68+xS3l7AyAADvgr1XvPw1ZtyIV+KPLxZ3N363g3Vj4:WATSOjUQK93luADIr1AMbKjxBULP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 736 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000c000000023b2b-3.dat upx behavioral2/memory/736-5-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/736-7-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3056 736 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3344 wrote to memory of 776 3344 rundll32.exe 83 PID 3344 wrote to memory of 776 3344 rundll32.exe 83 PID 3344 wrote to memory of 776 3344 rundll32.exe 83 PID 776 wrote to memory of 736 776 rundll32.exe 84 PID 776 wrote to memory of 736 776 rundll32.exe 84 PID 776 wrote to memory of 736 776 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_638c8d56be149f65514cbc3aa88706f0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_638c8d56be149f65514cbc3aa88706f0.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 2644⤵
- Program crash
PID:3056
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 736 -ip 7361⤵PID:1112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD527761550031391c56a3a59d3cb7229a5
SHA1643e456a5fb02a820e79e33fc66e8496f15e5955
SHA256b6b449ecd550692a3d8d5424e00885155e898d5cbbde98543a5b7b877073daab
SHA5122aa9607f71e4cb99ab4ccabe33a5f192117b733306cd8d1f4f3054077572e522bc71e1eae679877b5554d0bc3c1281fd5bcf822a2da5da291e6630f65470d0d6