Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 19:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_d0d80da52bd01843d38139b1ddf1ca3a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_d0d80da52bd01843d38139b1ddf1ca3a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/udpjzymus.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/udpjzymus.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_d0d80da52bd01843d38139b1ddf1ca3a.exe
-
Size
245KB
-
MD5
d0d80da52bd01843d38139b1ddf1ca3a
-
SHA1
da78153f04dae889906a621dcb1625035c4a292e
-
SHA256
64b919d36bd2047074cf6887e88e890871e9421305583a20da902265e31d15e4
-
SHA512
d0ab8c7ca8ebe802dbb80da9239c8eef49fa5206807d53981a51b3014a4c0b6932b3903ea80a5b96477341dee47002b8ab01d1f78a511d2d72dd402271941b16
-
SSDEEP
6144:wBlL/chDJGYkb1tHuldAvw0tmo5o9+75JJSu8IiXuZ0O1:CehFK1xmdetT5oE75jDzZv
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 3344 JaffaCakes118_d0d80da52bd01843d38139b1ddf1ca3a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2600 3344 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d0d80da52bd01843d38139b1ddf1ca3a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3344 wrote to memory of 4928 3344 JaffaCakes118_d0d80da52bd01843d38139b1ddf1ca3a.exe 83 PID 3344 wrote to memory of 4928 3344 JaffaCakes118_d0d80da52bd01843d38139b1ddf1ca3a.exe 83 PID 3344 wrote to memory of 4928 3344 JaffaCakes118_d0d80da52bd01843d38139b1ddf1ca3a.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d0d80da52bd01843d38139b1ddf1ca3a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d0d80da52bd01843d38139b1ddf1ca3a.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d0d80da52bd01843d38139b1ddf1ca3a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d0d80da52bd01843d38139b1ddf1ca3a.exe"2⤵PID:4928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 10562⤵
- Program crash
PID:2600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3344 -ip 33441⤵PID:3728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD535c7e2a63c059a4dbdb41078633ab8a2
SHA1c718c7587166f41d2bd3ba94ee23bbb85ca16f96
SHA2565d14d6480c4d20dd420d598d6e7f503b7e714ce9d21d56cc73a2f2dbcb1100af
SHA512dc6c4b050269f8cda0e729a577121ea5468dc48e879d46bbf75b8830c6fc4be8e31d8ae296e888c93cb14a981f05c7e5253838c56a0d38120f7d76b9e8788ec2