Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-01-2025 22:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0047616e158e96acf80112c9fec880f4.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_0047616e158e96acf80112c9fec880f4.dll
-
Size
647KB
-
MD5
0047616e158e96acf80112c9fec880f4
-
SHA1
45f60bf15b6cec31d5c1e189d54581e23bbbe028
-
SHA256
5b9a12539c4d248fd087fd87cc454749606eb3460cc8b2bab5f055287d3a5c65
-
SHA512
5cebb50dc80e3c3e2554c02a8645d942ea33273c412d25d1f6fdd8c7f7d9d5b252b4fc4b6492883b9f0b103d9573d8a590c5c1ef4382c8b69ccf86a7dd520d06
-
SSDEEP
12288:/E7NiOLg18+1/hv5VEipyz7mTWWa8afR2ftuD1xbmiULV1:/E3+F5GipwuWWpj+c7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2160 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 1864 rundll32.exe 1864 rundll32.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1788 1864 WerFault.exe 30 1264 2160 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1864 1700 rundll32.exe 30 PID 1700 wrote to memory of 1864 1700 rundll32.exe 30 PID 1700 wrote to memory of 1864 1700 rundll32.exe 30 PID 1700 wrote to memory of 1864 1700 rundll32.exe 30 PID 1700 wrote to memory of 1864 1700 rundll32.exe 30 PID 1700 wrote to memory of 1864 1700 rundll32.exe 30 PID 1700 wrote to memory of 1864 1700 rundll32.exe 30 PID 1864 wrote to memory of 2160 1864 rundll32.exe 31 PID 1864 wrote to memory of 2160 1864 rundll32.exe 31 PID 1864 wrote to memory of 2160 1864 rundll32.exe 31 PID 1864 wrote to memory of 2160 1864 rundll32.exe 31 PID 2160 wrote to memory of 1264 2160 rundll32mgr.exe 33 PID 2160 wrote to memory of 1264 2160 rundll32mgr.exe 33 PID 2160 wrote to memory of 1264 2160 rundll32mgr.exe 33 PID 2160 wrote to memory of 1264 2160 rundll32mgr.exe 33 PID 1864 wrote to memory of 1788 1864 rundll32.exe 32 PID 1864 wrote to memory of 1788 1864 rundll32.exe 32 PID 1864 wrote to memory of 1788 1864 rundll32.exe 32 PID 1864 wrote to memory of 1788 1864 rundll32.exe 32
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0047616e158e96acf80112c9fec880f4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0047616e158e96acf80112c9fec880f4.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 1004⤵
- Loads dropped DLL
- Program crash
PID:1264
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1864 -s 2203⤵
- Program crash
PID:1788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD594f2f6ffbba8e7644668b51b39983916
SHA163357bbdf90101969117983dbc0d4ed0e713c4d7
SHA256ede7603855cb37082c241c720a6650988c684eb3bcb263e5dd7b457458940fed
SHA512d04430ceac70c6fa71d07d9ee82ac2bb5e6c0641d5c9e7e5a3ed39d342e8b198f367676516a55f0653e0b88635a027b9ad220e223145b8be8df281bb6faf7156