Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-01-2025 09:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_78f59abb13c18b97df25064a7d7379b0.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_78f59abb13c18b97df25064a7d7379b0.dll
-
Size
221KB
-
MD5
78f59abb13c18b97df25064a7d7379b0
-
SHA1
e85980d623212decac94efefecf9a10cdce3aae8
-
SHA256
94df4593588eff3b4084bae23675fc06523915be3600a5458f080dd5ab7697d3
-
SHA512
b47ae95fbdeda1aae59ce17e8980e41f2fb750f4fe150a7aecbc83258f7b23c9f3d22bc8b89e69fddb8e6b053ad40dbcc86d3ab61e788ec33d291dfc650144ad
-
SSDEEP
3072:Bevj25xBncg9i9ICBHDRNO+wGlSwxFxq0D1bdB1Fw43R3Ab+2vyXU:MvOxBcgQ9IC52+bFxrR9DqvyE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2116 rundll32mgr.exe -
Loads dropped DLL 2 IoCs
pid Process 2524 rundll32.exe 2524 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2116 rundll32mgr.exe -
Suspicious behavior: MapViewOfSection 27 IoCs
pid Process 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe 2116 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2116 rundll32mgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2524 2516 rundll32.exe 31 PID 2516 wrote to memory of 2524 2516 rundll32.exe 31 PID 2516 wrote to memory of 2524 2516 rundll32.exe 31 PID 2516 wrote to memory of 2524 2516 rundll32.exe 31 PID 2516 wrote to memory of 2524 2516 rundll32.exe 31 PID 2516 wrote to memory of 2524 2516 rundll32.exe 31 PID 2516 wrote to memory of 2524 2516 rundll32.exe 31 PID 2524 wrote to memory of 2116 2524 rundll32.exe 32 PID 2524 wrote to memory of 2116 2524 rundll32.exe 32 PID 2524 wrote to memory of 2116 2524 rundll32.exe 32 PID 2524 wrote to memory of 2116 2524 rundll32.exe 32 PID 2116 wrote to memory of 384 2116 rundll32mgr.exe 3 PID 2116 wrote to memory of 384 2116 rundll32mgr.exe 3 PID 2116 wrote to memory of 384 2116 rundll32mgr.exe 3 PID 2116 wrote to memory of 384 2116 rundll32mgr.exe 3 PID 2116 wrote to memory of 384 2116 rundll32mgr.exe 3 PID 2116 wrote to memory of 384 2116 rundll32mgr.exe 3 PID 2116 wrote to memory of 384 2116 rundll32mgr.exe 3 PID 2116 wrote to memory of 392 2116 rundll32mgr.exe 4 PID 2116 wrote to memory of 392 2116 rundll32mgr.exe 4 PID 2116 wrote to memory of 392 2116 rundll32mgr.exe 4 PID 2116 wrote to memory of 392 2116 rundll32mgr.exe 4 PID 2116 wrote to memory of 392 2116 rundll32mgr.exe 4 PID 2116 wrote to memory of 392 2116 rundll32mgr.exe 4 PID 2116 wrote to memory of 392 2116 rundll32mgr.exe 4 PID 2116 wrote to memory of 432 2116 rundll32mgr.exe 5 PID 2116 wrote to memory of 432 2116 rundll32mgr.exe 5 PID 2116 wrote to memory of 432 2116 rundll32mgr.exe 5 PID 2116 wrote to memory of 432 2116 rundll32mgr.exe 5 PID 2116 wrote to memory of 432 2116 rundll32mgr.exe 5 PID 2116 wrote to memory of 432 2116 rundll32mgr.exe 5 PID 2116 wrote to memory of 432 2116 rundll32mgr.exe 5 PID 2116 wrote to memory of 480 2116 rundll32mgr.exe 6 PID 2116 wrote to memory of 480 2116 rundll32mgr.exe 6 PID 2116 wrote to memory of 480 2116 rundll32mgr.exe 6 PID 2116 wrote to memory of 480 2116 rundll32mgr.exe 6 PID 2116 wrote to memory of 480 2116 rundll32mgr.exe 6 PID 2116 wrote to memory of 480 2116 rundll32mgr.exe 6 PID 2116 wrote to memory of 480 2116 rundll32mgr.exe 6 PID 2116 wrote to memory of 488 2116 rundll32mgr.exe 7 PID 2116 wrote to memory of 488 2116 rundll32mgr.exe 7 PID 2116 wrote to memory of 488 2116 rundll32mgr.exe 7 PID 2116 wrote to memory of 488 2116 rundll32mgr.exe 7 PID 2116 wrote to memory of 488 2116 rundll32mgr.exe 7 PID 2116 wrote to memory of 488 2116 rundll32mgr.exe 7 PID 2116 wrote to memory of 488 2116 rundll32mgr.exe 7 PID 2116 wrote to memory of 496 2116 rundll32mgr.exe 8 PID 2116 wrote to memory of 496 2116 rundll32mgr.exe 8 PID 2116 wrote to memory of 496 2116 rundll32mgr.exe 8 PID 2116 wrote to memory of 496 2116 rundll32mgr.exe 8 PID 2116 wrote to memory of 496 2116 rundll32mgr.exe 8 PID 2116 wrote to memory of 496 2116 rundll32mgr.exe 8 PID 2116 wrote to memory of 496 2116 rundll32mgr.exe 8 PID 2116 wrote to memory of 588 2116 rundll32mgr.exe 9 PID 2116 wrote to memory of 588 2116 rundll32mgr.exe 9 PID 2116 wrote to memory of 588 2116 rundll32mgr.exe 9 PID 2116 wrote to memory of 588 2116 rundll32mgr.exe 9 PID 2116 wrote to memory of 588 2116 rundll32mgr.exe 9 PID 2116 wrote to memory of 588 2116 rundll32mgr.exe 9 PID 2116 wrote to memory of 588 2116 rundll32mgr.exe 9 PID 2116 wrote to memory of 668 2116 rundll32mgr.exe 10 PID 2116 wrote to memory of 668 2116 rundll32mgr.exe 10 PID 2116 wrote to memory of 668 2116 rundll32mgr.exe 10 PID 2116 wrote to memory of 668 2116 rundll32mgr.exe 10
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:588
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1956
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1412
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:668
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:736
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:808
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1044
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:848
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:2324
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:956
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:108
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1068
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:1076
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1160
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1204
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2312
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2336
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:488
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:496
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:392
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1124
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_78f59abb13c18b97df25064a7d7379b0.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_78f59abb13c18b97df25064a7d7379b0.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD578e3f033907ea994a9456f3f1c164b6c
SHA1c106c05f7ffe122777639cfb771431e62d9c8e03
SHA2564f398abd0091c32e100566ffa43db278c82965a71ee4878bd29cd6e104ab890d
SHA512e8c4419d3f4ce4adbf8f48fd9d0dbca2f6d9696533e07fc3c3224f6e9ff91813ef20f0317f58ab010a1bb96d5445af5f952f8eb559be8aacf944679217b4a2b1