Analysis
-
max time kernel
94s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 17:58
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7b0b77f2387d7fe9c35d417be4445a30.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_7b0b77f2387d7fe9c35d417be4445a30.dll
-
Size
132KB
-
MD5
7b0b77f2387d7fe9c35d417be4445a30
-
SHA1
286381ae8435f357a1c26a3bc8b9ecf07f27884a
-
SHA256
bf570075d47aec28ab3ea6243c23242bc8725d58c3d9317c56e2f91fedb91188
-
SHA512
dd1877df69b655f92513edd6149fba4eb4abd6e094f343dafbfa2595af79e2616e04df7d02880488c397f50fef8d4616e1f0d9de719a5fd35ea63058094efef3
-
SSDEEP
3072:VduM0UZVrq1eiresVpA8O1Y3fJMyyBxDlEJ:xFqRy4q46LEJ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1120 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000b000000023b87-3.dat upx behavioral2/memory/1120-4-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/1120-7-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 2520 1120 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4540 wrote to memory of 1668 4540 rundll32.exe 82 PID 4540 wrote to memory of 1668 4540 rundll32.exe 82 PID 4540 wrote to memory of 1668 4540 rundll32.exe 82 PID 1668 wrote to memory of 1120 1668 rundll32.exe 83 PID 1668 wrote to memory of 1120 1668 rundll32.exe 83 PID 1668 wrote to memory of 1120 1668 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b0b77f2387d7fe9c35d417be4445a30.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7b0b77f2387d7fe9c35d417be4445a30.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1120 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1120 -s 2644⤵
- Program crash
PID:2520
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1120 -ip 11201⤵PID:1744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5c0a37ec7d551f432e75f2ed5ae3df03f
SHA1c13588266bbcb28dda5e47e7d6e109c62633dfdf
SHA25623cc26a8ce27ec26d8ab8bace61141e530177e9610b0993d7206fd0b575b739d
SHA51214a019e2941643f1eff8ea9ce0bcb59f27fa865257cf64247895a5ecbed27b23518fbb9b08f4efc6fcf884327b0a40fea6448acb2ee00e670de8ba15a70db59f