Analysis
-
max time kernel
93s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2025 10:21
Behavioral task
behavioral1
Sample
JaffaCakes118_34a7a22bad034098a7d2c135f0e043e8.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_34a7a22bad034098a7d2c135f0e043e8.dll
-
Size
393KB
-
MD5
34a7a22bad034098a7d2c135f0e043e8
-
SHA1
69484aa696a0b71a2b665eb3db98af5cf085aed3
-
SHA256
32a4c8fffd879564dff07284163298bc1cff13e4244945b0da9afee8cf13a122
-
SHA512
1caa4711fa989159263466e5037a4c538fcfa11a791ef2218b0d27a15e550370779825d9d81e466384947e883467a398aa57a908c8801c3964b56b4daf43084f
-
SSDEEP
6144:0Vdb5rXZ1KaN1C2T9LRw8nTnp1jQoLCRPGSckIuEvlxNe/tEp2BlW00gTNHv/zEk:K5rHN1C2he+p1pc0qFv/zr1Em
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3732 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/memory/3504-0-0x0000000010000000-0x000000001017C000-memory.dmp upx behavioral2/files/0x000a000000023bff-3.dat upx behavioral2/memory/3732-5-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/memory/3504-7-0x0000000010000000-0x000000001017C000-memory.dmp upx behavioral2/memory/3732-9-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 4584 3504 WerFault.exe 82 4360 3732 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4972 wrote to memory of 3504 4972 rundll32.exe 82 PID 4972 wrote to memory of 3504 4972 rundll32.exe 82 PID 4972 wrote to memory of 3504 4972 rundll32.exe 82 PID 3504 wrote to memory of 3732 3504 rundll32.exe 83 PID 3504 wrote to memory of 3732 3504 rundll32.exe 83 PID 3504 wrote to memory of 3732 3504 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34a7a22bad034098a7d2c135f0e043e8.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_34a7a22bad034098a7d2c135f0e043e8.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3732 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3732 -s 2644⤵
- Program crash
PID:4360
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 6803⤵
- Program crash
PID:4584
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3504 -ip 35041⤵PID:1744
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3732 -ip 37321⤵PID:1956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD5db92102c142a97620d0f02b3321d235b
SHA184adf0da0cfa131b61a23cf26719b5d0c75702a9
SHA25612dc8f962b54cbf925146db55709c9ad8465e392aede3a5095f74e7ca6ade2a5
SHA51204bbb8ca5e5e63e85da4c4a9de8f46352cb9437005c0cae014da1d61c58916584a284fb7fba21b06f963de440362e150b6f2ef5d69143fd6a187c0712bf28d65