Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 16:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_416229224fc5afb3ef57cc4881197278.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_416229224fc5afb3ef57cc4881197278.dll
-
Size
352KB
-
MD5
416229224fc5afb3ef57cc4881197278
-
SHA1
949a407f81756c6091da2c2011b7f74925cbee00
-
SHA256
3f724fad9617b26eaf68cb23f8416ef135ab76a5e0658328dac56b4e583f06e5
-
SHA512
66e34fa922cf2184646d38d9be6b6dc113a760fc32e75eab2e6482a99d02bbaf70a05a44f6fab18a4c3f1f6dce1e4944b9eb1259ee0a45f6a08404a0bf70e9fb
-
SSDEEP
6144:YQb6g1fEi2FSGXbOYvz2+uOpGTIttHUUYTB/tZeXSGxU9Q8sQPomO55ZhpDw04:YttBEGXKSqEpGTIPdYT9tZeXFxZUPomT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1516 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x0033000000023b70-3.dat upx behavioral2/memory/1516-4-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/1516-9-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 3752 2168 WerFault.exe 82 4468 1516 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4952 wrote to memory of 2168 4952 rundll32.exe 82 PID 4952 wrote to memory of 2168 4952 rundll32.exe 82 PID 4952 wrote to memory of 2168 4952 rundll32.exe 82 PID 2168 wrote to memory of 1516 2168 rundll32.exe 83 PID 2168 wrote to memory of 1516 2168 rundll32.exe 83 PID 2168 wrote to memory of 1516 2168 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_416229224fc5afb3ef57cc4881197278.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_416229224fc5afb3ef57cc4881197278.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 2644⤵
- Program crash
PID:4468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 6323⤵
- Program crash
PID:3752
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2168 -ip 21681⤵PID:2300
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1516 -ip 15161⤵PID:3452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD5ec8e0b72ad9c2342179b16cca5191ee8
SHA15b104b6782ad9e26648a6b76e93cd139b59d14a5
SHA256f229fc976827f9f615b7ac1cc7efedee45a438401e01964a60fcaf64d433b2c7
SHA5129ee06d9f1152fe8757338c2462ba65a513feb561c002a4b979c7d25250f4779d1b880991fd03ec99d3402e2a768ef15c1f4849a8f28930e49bb69b204cccfe40