Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-01-2025 10:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6bf6b9971d471f26ead0ddb1338cec00.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6bf6b9971d471f26ead0ddb1338cec00.dll
-
Size
434KB
-
MD5
6bf6b9971d471f26ead0ddb1338cec00
-
SHA1
cd639977df6a545e7f8441bf22bd7a77650cdb18
-
SHA256
1eb6fa51a9017304effc614382481601b25fc633cb198bc7b2cc7e5a5bc5e428
-
SHA512
d83c5ea16065a085ca2c94dc3c0ca0ac31a81b9b1c6a38da691fd92b82f3ff58e2645960c58d84867673f6d4d159ec7237aaea16a5a85076e038382301f2d25f
-
SSDEEP
12288:Rn2QK/lGRgOUqmq9kR6lhKXPqljtOBZh1/k7LDm6q8:Rn2QK/cRgOnmq9g6uqKLhlUo8
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2796 rundll32mgr.exe 2704 hrl46E0.tmp 2716 kkqiuy.exe -
Loads dropped DLL 11 IoCs
pid Process 1780 rundll32.exe 1780 rundll32.exe 1780 rundll32.exe 2784 WerFault.exe 2784 WerFault.exe 2784 WerFault.exe 2784 WerFault.exe 2784 WerFault.exe 2784 WerFault.exe 2784 WerFault.exe 2716 kkqiuy.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\Y: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\G: rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\kkqiuy.exe hrl46E0.tmp File created C:\Windows\SysWOW64\gei33.dll kkqiuy.exe File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\kkqiuy.exe hrl46E0.tmp -
Program crash 1 IoCs
pid pid_target Process procid_target 2784 2796 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrl46E0.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kkqiuy.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1780 1728 rundll32.exe 30 PID 1728 wrote to memory of 1780 1728 rundll32.exe 30 PID 1728 wrote to memory of 1780 1728 rundll32.exe 30 PID 1728 wrote to memory of 1780 1728 rundll32.exe 30 PID 1728 wrote to memory of 1780 1728 rundll32.exe 30 PID 1728 wrote to memory of 1780 1728 rundll32.exe 30 PID 1728 wrote to memory of 1780 1728 rundll32.exe 30 PID 1780 wrote to memory of 2796 1780 rundll32.exe 31 PID 1780 wrote to memory of 2796 1780 rundll32.exe 31 PID 1780 wrote to memory of 2796 1780 rundll32.exe 31 PID 1780 wrote to memory of 2796 1780 rundll32.exe 31 PID 1780 wrote to memory of 2704 1780 rundll32.exe 32 PID 1780 wrote to memory of 2704 1780 rundll32.exe 32 PID 1780 wrote to memory of 2704 1780 rundll32.exe 32 PID 1780 wrote to memory of 2704 1780 rundll32.exe 32 PID 2796 wrote to memory of 2784 2796 rundll32mgr.exe 33 PID 2796 wrote to memory of 2784 2796 rundll32mgr.exe 33 PID 2796 wrote to memory of 2784 2796 rundll32mgr.exe 33 PID 2796 wrote to memory of 2784 2796 rundll32mgr.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6bf6b9971d471f26ead0ddb1338cec00.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6bf6b9971d471f26ead0ddb1338cec00.dll,#12⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 1284⤵
- Loads dropped DLL
- Program crash
PID:2784
-
-
-
C:\Users\Admin\AppData\Local\Temp\hrl46E0.tmpC:\Users\Admin\AppData\Local\Temp\hrl46E0.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2704
-
-
-
C:\Windows\SysWOW64\kkqiuy.exeC:\Windows\SysWOW64\kkqiuy.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
84KB
MD5a6ee7aab6b8f8268bf9eb763949d5c8b
SHA14600e17eb8fa4a11170aaa2c54d98126e58290e0
SHA2569030a2ec813b5a70b898aacd81378c941bc5f62e78cc1a958f93106ede81228c
SHA51200569ed578d3f0b535b0c17dc131131e4aaf73b8b5235c70fcf8de649e8a942f48a013e8c687c6abab05a8f7516dabed41309da6ce7c9eb26992183e4794afb8
-
Filesize
338KB
MD59e5a94f2b4b378b2f50805cdd1efe405
SHA1e56fce2eedf674218165bdf53da7943f47875835
SHA2560a7ec6b90c8c4842f8348297b3cb61ec0ed4545e6f33a07089c9470ead25570b
SHA51221d8095183bfbc582a829af2c1f35c07ce2ebb120bece797f6e067f7c69c86beeaf7911f447d33540290504a8ad0318041743ee17ba2df3099b2729841a22827
-
Filesize
9KB
MD5655d12e373b5891981111e48da1f0a88
SHA1db346a8879c226b2a6fb13300a8cccb089326b04
SHA2563eecef36be5dcb9c81ebbbd2eb0bdcd456d81592673fae46f043d5423b8d7748
SHA5120a27696905df67638e43ae479e376f89657475675711c9d1b292da629520cc36dfafca12232308b232a7ccc3e9e47b39baf1b9d0b597c8d1c6946aa827aaeeea