Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 15:29
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7a70f459ba09724874399055d0718651.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_7a70f459ba09724874399055d0718651.dll
-
Size
114KB
-
MD5
7a70f459ba09724874399055d0718651
-
SHA1
733ddd1584d64bcae01a987f10cba39562b17349
-
SHA256
eb7c5798828598cda2caf8ab7a101e0b994cf1f6791e0e2da3ae175e91fa2572
-
SHA512
ec7e0a4fafde44fac62e2941f8ba724168618adb94549f5a3e63c286c0e6e9ffc8c912b639752bc007fd094100e7ac853a97de628d5f061dd41c3193e6c16c44
-
SSDEEP
3072:TwmhkkkkujThPKpFLzNl4M+dzDsLVRi627ekkphLxckGhVHbW0vksgxrKkLRskN3:TGpPkF3NrwzDsLDiy4aYU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3116 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000c000000023b18-3.dat upx behavioral2/memory/3116-5-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3116-7-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4116 3116 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4448 wrote to memory of 3656 4448 rundll32.exe 82 PID 4448 wrote to memory of 3656 4448 rundll32.exe 82 PID 4448 wrote to memory of 3656 4448 rundll32.exe 82 PID 3656 wrote to memory of 3116 3656 rundll32.exe 83 PID 3656 wrote to memory of 3116 3656 rundll32.exe 83 PID 3656 wrote to memory of 3116 3656 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a70f459ba09724874399055d0718651.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7a70f459ba09724874399055d0718651.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 2644⤵
- Program crash
PID:4116
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3116 -ip 31161⤵PID:3688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5db92102c142a97620d0f02b3321d235b
SHA184adf0da0cfa131b61a23cf26719b5d0c75702a9
SHA25612dc8f962b54cbf925146db55709c9ad8465e392aede3a5095f74e7ca6ade2a5
SHA51204bbb8ca5e5e63e85da4c4a9de8f46352cb9437005c0cae014da1d61c58916584a284fb7fba21b06f963de440362e150b6f2ef5d69143fd6a187c0712bf28d65