Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2025, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6d5a226269f9f1b37e29a33af95e7360.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_6d5a226269f9f1b37e29a33af95e7360.dll
-
Size
576KB
-
MD5
6d5a226269f9f1b37e29a33af95e7360
-
SHA1
c2d0822260e1d3a99d78066280f54f5ec10538bb
-
SHA256
8f852dc24d3767e23bcda5f41836f2a3831d320913f04b5c04065130a3070e45
-
SHA512
53e87eb4cb02eb949bbc678ad9d1f366e01667fd9a8c7ee948e2ae82c28adad3dd88f48a414769e067bad062dffd1beca1174f3a1e51b76a246ed72cefed8456
-
SSDEEP
6144:1ZLT3A5Dp0HvFIc5vBlcQGSgS62iiiiiSySYSGS+8c8c8AAANA/AA0fMGrgPhclc:1ZL7A5l0711g8onrOcWAqVvWhi1VrgvA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2472 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000d000000023ba1-3.dat upx behavioral2/memory/2472-5-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2472-7-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 2020 4060 WerFault.exe 83 2276 2472 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2004 wrote to memory of 4060 2004 rundll32.exe 83 PID 2004 wrote to memory of 4060 2004 rundll32.exe 83 PID 2004 wrote to memory of 4060 2004 rundll32.exe 83 PID 4060 wrote to memory of 2472 4060 rundll32.exe 84 PID 4060 wrote to memory of 2472 4060 rundll32.exe 84 PID 4060 wrote to memory of 2472 4060 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6d5a226269f9f1b37e29a33af95e7360.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6d5a226269f9f1b37e29a33af95e7360.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 2644⤵
- Program crash
PID:2276
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4060 -s 6123⤵
- Program crash
PID:2020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2472 -ip 24721⤵PID:3812
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4060 -ip 40601⤵PID:4756
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD527761550031391c56a3a59d3cb7229a5
SHA1643e456a5fb02a820e79e33fc66e8496f15e5955
SHA256b6b449ecd550692a3d8d5424e00885155e898d5cbbde98543a5b7b877073daab
SHA5122aa9607f71e4cb99ab4ccabe33a5f192117b733306cd8d1f4f3054077572e522bc71e1eae679877b5554d0bc3c1281fd5bcf822a2da5da291e6630f65470d0d6