Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 01:18
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_090f5e1fc96bdcac4b62013c7dd1355b.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_090f5e1fc96bdcac4b62013c7dd1355b.dll
-
Size
144KB
-
MD5
090f5e1fc96bdcac4b62013c7dd1355b
-
SHA1
8a482b1311016c17fd439d8241e07fee49b9358f
-
SHA256
5c77aa10fe11b7d26547b0ec4b526b93f37ec549ddd153b24a8e706169e7a60c
-
SHA512
5158aaed72803791c3d7c520b3248238337d071e7b5a3e3f71dc6835bc220e89cf553b7ac81246115488d35a9429d2353eb8a62bf58c26d2cdaada44c0e2afcb
-
SSDEEP
1536:1ibToqp78CcWuDSPCw8YhekzkuGWq5A//J1Z6sQflFde0vms2:1ibTTp78CcWmSvFekzk7WJ1Zg9/e/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2508 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 2372 rundll32.exe 2372 rundll32.exe 2996 WerFault.exe 2996 WerFault.exe 2996 WerFault.exe 2996 WerFault.exe 2996 WerFault.exe 2996 WerFault.exe 2996 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3000 2372 WerFault.exe 30 2996 2508 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2372 2516 rundll32.exe 30 PID 2516 wrote to memory of 2372 2516 rundll32.exe 30 PID 2516 wrote to memory of 2372 2516 rundll32.exe 30 PID 2516 wrote to memory of 2372 2516 rundll32.exe 30 PID 2516 wrote to memory of 2372 2516 rundll32.exe 30 PID 2516 wrote to memory of 2372 2516 rundll32.exe 30 PID 2516 wrote to memory of 2372 2516 rundll32.exe 30 PID 2372 wrote to memory of 2508 2372 rundll32.exe 31 PID 2372 wrote to memory of 2508 2372 rundll32.exe 31 PID 2372 wrote to memory of 2508 2372 rundll32.exe 31 PID 2372 wrote to memory of 2508 2372 rundll32.exe 31 PID 2372 wrote to memory of 3000 2372 rundll32.exe 32 PID 2372 wrote to memory of 3000 2372 rundll32.exe 32 PID 2372 wrote to memory of 3000 2372 rundll32.exe 32 PID 2372 wrote to memory of 3000 2372 rundll32.exe 32 PID 2508 wrote to memory of 2996 2508 rundll32mgr.exe 33 PID 2508 wrote to memory of 2996 2508 rundll32mgr.exe 33 PID 2508 wrote to memory of 2996 2508 rundll32mgr.exe 33 PID 2508 wrote to memory of 2996 2508 rundll32mgr.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_090f5e1fc96bdcac4b62013c7dd1355b.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_090f5e1fc96bdcac4b62013c7dd1355b.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2508 -s 1004⤵
- Loads dropped DLL
- Program crash
PID:2996
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 2243⤵
- Program crash
PID:3000
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD50ff8c1c8de1f818a51512f4d894e30d1
SHA1bd99a343ea5ca5ebdd7207651478a8425054716a
SHA2567cc54785e229b1605103e3219969939eb80f106e9edca3cb380917ac33526d28
SHA512da23767aa25ba5c1bb55c338fa82b1b60853c83fd1e4af28cc023fdd1405b46717bc58137d7bfe7a3a581dcd23de0520ab6ace88434b8cf35b3a0278f516dfd2