Analysis
-
max time kernel
94s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2025, 15:50
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6dbb8547508e47dd3a5426d4edcf050e.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6dbb8547508e47dd3a5426d4edcf050e.dll
-
Size
200KB
-
MD5
6dbb8547508e47dd3a5426d4edcf050e
-
SHA1
29e32faf105f9c442e5c3f1b5de38d2e4dfab8c8
-
SHA256
faebe6c260f6f0aeb15d3ccb7804f403da69b569991a20beb0606938c005bd72
-
SHA512
1ed622c0047b582c8169a942df953331b655b42f1b46d0ed7f39d8928c31c6f96b00210d3efa78bcd67802a36ea8173e667ac10d58c208b9a6047a82050b11e2
-
SSDEEP
3072:x4vRpRkTcZ7fcxdl5CT1lW+I0UIfMiYjJQtvbpPrLtoxCvPesuPmFOl+5UIBshF:xQlWcMg9rp2lzKk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3884 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000c000000023b9b-3.dat upx behavioral2/memory/3884-5-0x0000000000400000-0x0000000000434000-memory.dmp upx behavioral2/memory/3884-6-0x0000000000400000-0x0000000000434000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 116 3884 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4508 wrote to memory of 1864 4508 rundll32.exe 82 PID 4508 wrote to memory of 1864 4508 rundll32.exe 82 PID 4508 wrote to memory of 1864 4508 rundll32.exe 82 PID 1864 wrote to memory of 3884 1864 rundll32.exe 83 PID 1864 wrote to memory of 3884 1864 rundll32.exe 83 PID 1864 wrote to memory of 3884 1864 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6dbb8547508e47dd3a5426d4edcf050e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6dbb8547508e47dd3a5426d4edcf050e.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
PID:3884 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 2604⤵
- Program crash
PID:116
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3884 -ip 38841⤵PID:544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD5202a068e9e52853d7ed7887ec7dfbe52
SHA1ce1e72c19689f912f48a345cfcc84d79b9a750eb
SHA25695cc192ab86094ea9d54ae9d8f320291907d0297edd147b25395265a39cf1356
SHA5127a3ea8730111068c92b2ef642bd0a3c0ab26ff31b41e743edd96223d7f169e2d8e0c37870cda8f6885e2b21e784edd11f85afbf5e8b45eb4aefdfb2380f0f1e6