Analysis
-
max time kernel
96s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 00:57
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_127174fe9a8c19f58ef466ea84316295.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_127174fe9a8c19f58ef466ea84316295.dll
-
Size
1.2MB
-
MD5
127174fe9a8c19f58ef466ea84316295
-
SHA1
330d313f3415de7d0ff2f59aafc616913183c33c
-
SHA256
6e0cb9dc708b66806c60b6917735680528fe025574667fc36e0750e9e749aab1
-
SHA512
26fde063b598703eabd8105d0116831f20b67e23474c5acc7558ae1795f746e2e1fe5df937dd468c201c3145f1e61b2b31f5f84cde67be139658744251115093
-
SSDEEP
24576:/KMa+QECSwrS2yUJ0AvivK3hPAnYGLzRxahfTN9Wn+lNs6wWKyM7Bfft8ypGYRZb:IDJzDljp0X1yoHtjTjQYPPbxA8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5068 regsvr32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
resource yara_rule behavioral2/files/0x000c000000023b82-3.dat upx behavioral2/memory/5068-4-0x0000000000400000-0x0000000000454000-memory.dmp upx behavioral2/memory/5068-7-0x0000000000400000-0x0000000000454000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 2140 5068 WerFault.exe 86 1760 4900 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4996 wrote to memory of 4900 4996 regsvr32.exe 85 PID 4996 wrote to memory of 4900 4996 regsvr32.exe 85 PID 4996 wrote to memory of 4900 4996 regsvr32.exe 85 PID 4900 wrote to memory of 5068 4900 regsvr32.exe 86 PID 4900 wrote to memory of 5068 4900 regsvr32.exe 86 PID 4900 wrote to memory of 5068 4900 regsvr32.exe 86
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_127174fe9a8c19f58ef466ea84316295.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_127174fe9a8c19f58ef466ea84316295.dll2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
PID:5068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 2684⤵
- Program crash
PID:2140
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 7363⤵
- Program crash
PID:1760
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4900 -ip 49001⤵PID:2616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 5068 -ip 50681⤵PID:4240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5f57eee1185dee33198b752dd1f66ad55
SHA1b60f88d65f8805bf2ca095ecd1727b15eed4ff12
SHA2566bb93bea58d84b9c6a562a6b888ec84ba0ecb7575b6c8f3264a9e9fb44ee37f7
SHA512cd97a2207d7ad6178cc7c9fb13fda7015bc30a924aa43b6e8ba07961ef878a841e6d025047a35e3b60ef23a3ab9b59b16d1abe09f39dc0cd6e5515d46630ad40