Analysis
-
max time kernel
93s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 00:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_693ee3cf7c8ba77980af66f8b023f8b0.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_693ee3cf7c8ba77980af66f8b023f8b0.dll
-
Size
156KB
-
MD5
693ee3cf7c8ba77980af66f8b023f8b0
-
SHA1
059f3dd5a6aa38612cade0f2c5b5cab54d1c53ec
-
SHA256
07bca7bd4f05c833f6a0dbf66cd2ab07f64adfcf810e6c5675089336fec011c3
-
SHA512
bba7efeb073abf17487f17512e6f5a71c02bb2d581540b905440595defe559737feaf6bee7b8ab6009057e05788ec6c4fe35e8882b294fb902e44b05ca56d489
-
SSDEEP
3072:g7x/gEUOOQxB1aNGmERuZSUhrafmSt5tL+gO6f7OKiUXlvKJZXvf/5USm:g5gROOQxBM0HUqmSt5tL+YqK5KJ1n/yJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5112 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x0009000000023c60-3.dat upx behavioral2/memory/5112-4-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/5112-7-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2304 5112 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5024 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4316 wrote to memory of 5024 4316 rundll32.exe 83 PID 4316 wrote to memory of 5024 4316 rundll32.exe 83 PID 4316 wrote to memory of 5024 4316 rundll32.exe 83 PID 5024 wrote to memory of 5112 5024 rundll32.exe 84 PID 5024 wrote to memory of 5112 5024 rundll32.exe 84 PID 5024 wrote to memory of 5112 5024 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_693ee3cf7c8ba77980af66f8b023f8b0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_693ee3cf7c8ba77980af66f8b023f8b0.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5112 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 2644⤵
- Program crash
PID:2304
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5112 -ip 51121⤵PID:4736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5ebc35bf5774a4b75cd45638cecb74db3
SHA13a4858d3ab2074b6d2d5a999a7443c683af2417b
SHA25652c970b575040b26c6c357f1aa64288544578a229b9be70acd0f860f55cca346
SHA512365feb8dccdbf66ff9dd5e1aa08126b0c6da0cb1fe6cf7a986cbb6c66928f7c3282492c11946598652e18fa695f7ea7021cd3f5943a20650e9efe829a0891ca1