Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-01-2025 21:01
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_11104cb4970494f5fc485a2839d97fe7.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_11104cb4970494f5fc485a2839d97fe7.dll
-
Size
228KB
-
MD5
11104cb4970494f5fc485a2839d97fe7
-
SHA1
a5528a3fbe8eda0e527aa5e932481396ab4e6231
-
SHA256
39d1de6a1fb303175651fe8001f5aa358f26342d0c5a1f6a47fd929a01faca5c
-
SHA512
e9ef07ca5b4c653a35567521137dd06b1ed9a525e3c6dce6771c23dc15a80f2511e772f1b571cb4ce05329e637de73b263be90e60d4482df84b1f5618be2ff9d
-
SSDEEP
3072:wgKKuiX63bw5dNjDh8pWVgTlFIYnFFD6DOM2iU0BVRoO9:hKZp3KNjVGvFF+SM2inhoW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3008 rundll32mgr.exe -
Loads dropped DLL 9 IoCs
pid Process 2952 rundll32.exe 2952 rundll32.exe 1924 WerFault.exe 1924 WerFault.exe 1924 WerFault.exe 1924 WerFault.exe 1924 WerFault.exe 1924 WerFault.exe 1924 WerFault.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process 1924 3008 WerFault.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1768 wrote to memory of 2952 1768 rundll32.exe 31 PID 1768 wrote to memory of 2952 1768 rundll32.exe 31 PID 1768 wrote to memory of 2952 1768 rundll32.exe 31 PID 1768 wrote to memory of 2952 1768 rundll32.exe 31 PID 1768 wrote to memory of 2952 1768 rundll32.exe 31 PID 1768 wrote to memory of 2952 1768 rundll32.exe 31 PID 1768 wrote to memory of 2952 1768 rundll32.exe 31 PID 2952 wrote to memory of 3008 2952 rundll32.exe 32 PID 2952 wrote to memory of 3008 2952 rundll32.exe 32 PID 2952 wrote to memory of 3008 2952 rundll32.exe 32 PID 2952 wrote to memory of 3008 2952 rundll32.exe 32 PID 3008 wrote to memory of 1924 3008 rundll32mgr.exe 33 PID 3008 wrote to memory of 1924 3008 rundll32mgr.exe 33 PID 3008 wrote to memory of 1924 3008 rundll32mgr.exe 33 PID 3008 wrote to memory of 1924 3008 rundll32mgr.exe 33
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_11104cb4970494f5fc485a2839d97fe7.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_11104cb4970494f5fc485a2839d97fe7.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 1004⤵
- Loads dropped DLL
- Program crash
PID:1924
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD58a04558595485ce4e50f94301ef76535
SHA16fbb5ead4c083e2257be8fbadc386bb4b1a874e9
SHA2566d4b385cb816f26f78500326392dd5795857697aebc1678da82463c70b02b36b
SHA51287dfa39743490a51090c81e38cc9393ee48a1b3b51bfe451f73b72db34a65ac9f08447cbbd9b5e05363474248eb961c5b579cc06bb2957101caf19860792cdd3