Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 00:39
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_692efe0f0a2e1c3914f29dd480ce0550.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_692efe0f0a2e1c3914f29dd480ce0550.dll
-
Size
451KB
-
MD5
692efe0f0a2e1c3914f29dd480ce0550
-
SHA1
8c3ef6b92a3f6ff586313bb0406844b68d9b5464
-
SHA256
cb92007410ba11fa6bcefd23c8e0c8741c3f7469c5f20714a3b0b6895f0fea6f
-
SHA512
bd22e56fb9a5600d2f6586a6a600c34287a94142ddcd53d55919633334fbe7b7cbf3d163c6601c64fda7bd6a21db2ba531db2174ca038cc236453cb4031b8434
-
SSDEEP
12288:WU866w0B2uJ2s4otqFCJrW9FqvSbqsHasgXhFHDAGtlRXZ+CP63n0NuJvm0aL7+z:WSGB2uJ2s4otqFCJrW9FqvSbqsHasgXi
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" tazebama.dl_ -
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 3140 rundll32mgr.exe 648 tazebama.dl_ -
Loads dropped DLL 2 IoCs
pid Process 3140 rundll32mgr.exe 3140 rundll32mgr.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: tazebama.dl_ File opened (read-only) \??\U: tazebama.dl_ File opened (read-only) \??\T: tazebama.dl_ File opened (read-only) \??\R: tazebama.dl_ File opened (read-only) \??\L: tazebama.dl_ File opened (read-only) \??\Z: tazebama.dl_ File opened (read-only) \??\S: tazebama.dl_ File opened (read-only) \??\Q: tazebama.dl_ File opened (read-only) \??\O: tazebama.dl_ File opened (read-only) \??\M: tazebama.dl_ File opened (read-only) \??\J: tazebama.dl_ File opened (read-only) \??\E: tazebama.dl_ File opened (read-only) \??\W: tazebama.dl_ File opened (read-only) \??\N: tazebama.dl_ File opened (read-only) \??\I: tazebama.dl_ File opened (read-only) \??\Y: tazebama.dl_ File opened (read-only) \??\P: tazebama.dl_ File opened (read-only) \??\K: tazebama.dl_ File opened (read-only) \??\H: tazebama.dl_ File opened (read-only) \??\G: tazebama.dl_ File opened (read-only) \??\V: tazebama.dl_ -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf tazebama.dl_ File opened for modification C:\autorun.inf tazebama.dl_ File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf tazebama.dl_ -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/memory/3140-20-0x0000000000400000-0x000000000042C1D8-memory.dmp upx behavioral2/memory/3140-52-0x0000000000400000-0x000000000040C000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES (X86)\ADOBE\ACROBAT READER DC\READER\ACRORD32.EXE tazebama.dl_ -
Program crash 3 IoCs
pid pid_target Process procid_target 3336 648 WerFault.exe 84 1192 3140 WerFault.exe 83 1676 3240 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tazebama.dl_ Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3240 rundll32.exe 3240 rundll32.exe 648 tazebama.dl_ 648 tazebama.dl_ -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1208 wrote to memory of 3240 1208 rundll32.exe 82 PID 1208 wrote to memory of 3240 1208 rundll32.exe 82 PID 1208 wrote to memory of 3240 1208 rundll32.exe 82 PID 3240 wrote to memory of 3140 3240 rundll32.exe 83 PID 3240 wrote to memory of 3140 3240 rundll32.exe 83 PID 3240 wrote to memory of 3140 3240 rundll32.exe 83 PID 3140 wrote to memory of 648 3140 rundll32mgr.exe 84 PID 3140 wrote to memory of 648 3140 rundll32mgr.exe 84 PID 3140 wrote to memory of 648 3140 rundll32mgr.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_692efe0f0a2e1c3914f29dd480ce0550.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_692efe0f0a2e1c3914f29dd480ce0550.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"4⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 7405⤵
- Program crash
PID:3336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3140 -s 101964⤵
- Program crash
PID:1192
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3240 -s 6043⤵
- Program crash
PID:1676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 648 -ip 6481⤵PID:1564
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3140 -ip 31401⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3240 -ip 32401⤵PID:4404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD547b113070aff9783c00295fbe1833d73
SHA11c4c8e70fbf2bea92166287dcc434d9cf6e6f105
SHA25689fd79c1bfff8f3916e98ffdf05d1eaf05c23413463fcc82bfe378dc3d174780
SHA5124f0f2736ba66e7039ec114ebb417e9dcdb8948659b813eca19050d6fe7a425fd94949036d23f195713a318ed98d63c2284a96b090ba7ae0beb1ec434a0837922
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
32KB
MD5b6a03576e595afacb37ada2f1d5a0529
SHA1d598d4d0e70dec2ffa2849edaeb4db94fedcc0b8
SHA2561707eaf60aa91f3791aa5643bfa038e9d8141878d61f5d701ebac51f4ae7aaad
SHA512181b7cc6479352fe2c53c3630d45a839cdeb74708be6709c2a75847a54de3ffc1fdac8450270dde7174ecb23e5cb002f8ce39032429a3112b1202f3381b8918c
-
Filesize
256KB
MD5d50830773758ad14ed57327d9374cabb
SHA1eb83933da289253ad585a4cb195a26a2dbc65abd
SHA2560099712d314b7470f2bbd7141e3b8fcd8aaa63edb97ee8d1baff55f3ae55128a
SHA512108f3e9690d32b1b9e7359c0feb9624ecf750a8f5dd41d9dc5fee3c80f99563b1819ae06e665f676bb560f80534ba4df0943cea43897f15b130e6f180094142f
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
157KB
MD5042ae7730c6d6f58f27dad0a69efc9e4
SHA1f46d3db5ed0790cd66bcd64ce1f673cad829f8b9
SHA25650ddd83b0914653f429b165f1906fad7b866adeed913ff1c1d88b1ba4842fc38
SHA512cec02f613f0450d3a0d315e68558b5c1f5a9719c5ec325619fda690bc4c01f934b2e528723abf74e079f7f767dfe08dd40bbf1541d07c46c3f7b97f3674ea3c8
-
Filesize
158KB
MD500d2c3bfcb0d71a302a0baa3cfd48ff2
SHA18db917038045a50e909f0efbfe49ffc1ccdba16c
SHA2565d1590865cddc04306d58e86486072ec2c46d0d6a9a85ee21ac0554af4e70cdd
SHA5121c7d07a8ff187cf8853753ca9ce6decd207333c2050d6fc694ad826c974eb51a686180f000042b04f8f1e482dddc5bba62ae55d5e9e9e637b4e101505da37e7b