Analysis
-
max time kernel
129s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e28883b2de6a815081a6657a1c3aba43.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e28883b2de6a815081a6657a1c3aba43.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e28883b2de6a815081a6657a1c3aba43.dll
-
Size
388KB
-
MD5
e28883b2de6a815081a6657a1c3aba43
-
SHA1
60562fe77fd0a03f3743eaea5e252d770c825012
-
SHA256
698be2b05cdc280c40dbc4511abbdb3ae7b524fe09193f4cbb9a10854b605b59
-
SHA512
c54c073b9461cc6159d0d28ed019fa7893201d5bb894ec6f1678c139d337616880ca51328a62b9a9bd56627b09a7cfc66881251bd74cc1a10d6e451e69855aa0
-
SSDEEP
6144:hfGHeq2kJft+YD/+9QaU9PpQrC0DqAnu7rhHf4UwlRS6Cj5KAvvwB/Rgl8zMrML:meq2AlPW9IRpQr7u79HwUIRS6EvYBei
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Print Processors 1 TTPs 1 IoCs
Adversaries may abuse print processors to run malicious DLLs during system boot for persistence and/or privilege escalation.
description ioc Process File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\79BC.tmp rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\spool\PRTPROCS\x64\79BC.tmp rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1216 rundll32.exe 1216 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1284 wrote to memory of 1216 1284 rundll32.exe 83 PID 1284 wrote to memory of 1216 1284 rundll32.exe 83 PID 1284 wrote to memory of 1216 1284 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e28883b2de6a815081a6657a1c3aba43.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e28883b2de6a815081a6657a1c3aba43.dll,#12⤵
- Boot or Logon Autostart Execution: Print Processors
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
328KB
MD5ef632c77ccd213a3510a76af10babd90
SHA14307fb2303076af7c22abe4a8cbc50ea59004f5b
SHA256753e13ec1ce484f415a416f7cae13e6815cf24f6faf4febfa7226eb63259f342
SHA512fe27e6b95671527fd7a0f29779844df090a8993f7d7b97ef455590750b0390715bda6262909788a71d23aeb92cb707f12034758befe4ead94c22a4a1d45538f8