Analysis
-
max time kernel
94s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2025, 09:24 UTC
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2009450aa44ee1c9d061a26f564862ff.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_2009450aa44ee1c9d061a26f564862ff.dll
-
Size
180KB
-
MD5
2009450aa44ee1c9d061a26f564862ff
-
SHA1
7120156b1917d221baa4e45d4f19d8cbaf7a523d
-
SHA256
56def55f3a1bdcd719dbaa639e93ef42b730e6b8cf7fb44a465279da7b83ccde
-
SHA512
50ac97a73b534b4cf0e7c243797cdb7bcff408f62160df9a7952e205bcf3a7cb800aa3ef35423242a37465418f2aa143b4c757354a04247b48700f3fc4f14b1c
-
SSDEEP
3072:vNEqkap78EqMJxy9NG30CejqjHI4f82PDZTDjrzjRBcNhP:1EqkE4hMue9VfDZrrB+LP
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4944 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000a000000023bdf-3.dat upx behavioral2/memory/4944-5-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/4944-7-0x0000000000400000-0x0000000000463000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 3912 4944 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2624 wrote to memory of 4852 2624 rundll32.exe 82 PID 2624 wrote to memory of 4852 2624 rundll32.exe 82 PID 2624 wrote to memory of 4852 2624 rundll32.exe 82 PID 4852 wrote to memory of 4944 4852 rundll32.exe 83 PID 4852 wrote to memory of 4944 4852 rundll32.exe 83 PID 4852 wrote to memory of 4944 4852 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2009450aa44ee1c9d061a26f564862ff.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2009450aa44ee1c9d061a26f564862ff.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 2644⤵
- Program crash
PID:3912
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4944 -ip 49441⤵PID:4228
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request133.211.185.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request133.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request7.98.51.23.in-addr.arpaIN PTRResponse7.98.51.23.in-addr.arpaIN PTRa23-51-98-7deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request58.55.71.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.163.245.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTRResponse
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
133.211.185.52.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
133.32.126.40.in-addr.arpa
-
69 B 131 B 1 1
DNS Request
7.98.51.23.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
58.55.71.13.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
56.163.245.4.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.227.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5d83374187a9308d90dd5659e95f01373
SHA1796799bc4e5be46b639f1e6979b554c1efd8fa00
SHA256d2c95a02ea13d4fa3625276945fe7fe8e799cff15acec4104c17fd4fd4ac0d2c
SHA512286477d60e1ebfb0e6b018aaccd891259fc12c32200c8a7f1f88660f5b711bd8163d2a95bb41eb02f429b990d6b174cda874cbe675b921ffaeb29da0870759e5