Analysis
-
max time kernel
135s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 06:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6ad957f406dc66c177305ddb8e4835d4.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_6ad957f406dc66c177305ddb8e4835d4.dll
-
Size
204KB
-
MD5
6ad957f406dc66c177305ddb8e4835d4
-
SHA1
2bb10f3d57453f25d04a19b3144a6222b0e87b67
-
SHA256
5a6b6ac9e464c4aa636974812118afbf645cf26ae7eb7b471d3f7a9d27274ae3
-
SHA512
1439071c27e0ad078a91e2170b170a2613c83098e7583dce2221261fe6e8d0a964493b41753ec277eecc9a16e34ac92ac95d410c638241842cb406571ca74fc1
-
SSDEEP
6144:2n8FEvxNiItcpYQxcvJU3+aCCJUf7mfv9u:PF2iEX+cvsrCC2f7mnk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2148 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000d000000023b33-5.dat upx behavioral2/memory/2148-7-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral2/memory/2148-9-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2456 2148 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4620 wrote to memory of 4088 4620 rundll32.exe 84 PID 4620 wrote to memory of 4088 4620 rundll32.exe 84 PID 4620 wrote to memory of 4088 4620 rundll32.exe 84 PID 4088 wrote to memory of 2148 4088 rundll32.exe 85 PID 4088 wrote to memory of 2148 4088 rundll32.exe 85 PID 4088 wrote to memory of 2148 4088 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ad957f406dc66c177305ddb8e4835d4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6ad957f406dc66c177305ddb8e4835d4.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 2644⤵
- Program crash
PID:2456
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2148 -ip 21481⤵PID:1924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129KB
MD5d8c8aec24f832e3beaeb3865b17dcb95
SHA1eb791e2c4cc783c60460f8b3628e034107659367
SHA2561284cfe422573f4a7495bd98ebe0b81c27186ff292059e4d8aff07e917218859
SHA51264bf0f321e4a4a3e83611374472eef63f167827e8ca26c27c1cb8ab337dd2921eca1a3b08dd8b0ea22027c5a1258c3bee041a0009f76f40ab372916f88b82c47