Analysis
-
max time kernel
96s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 02:07
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_45c57c5b507b4606e97075a822387b2a.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_45c57c5b507b4606e97075a822387b2a.dll
-
Size
697KB
-
MD5
45c57c5b507b4606e97075a822387b2a
-
SHA1
02bb822134fcfdcd178dd6d36c324104f23de1aa
-
SHA256
18f7f242adda93ed24ef888b33932124970cff5b6a3fba1d6ab6ac6c247c74a2
-
SHA512
0999d3904c1f7abadb4aa0107007c236d953658eecbc90020721cd9b5b118b856babd9cc8fe0beadb265534e40b57a09901c89eab6f0f0dead05c4b4d379717f
-
SSDEEP
12288:0hJDUanWzEp4226DQA1p6eH4hurcMY9K5opGkh9GXxAv+MnGKCdlGJou6fERxRCp:0hhBWzEp4yDQA1p6eYhugNo5d42Ov+M7
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1560 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000c000000023b1b-3.dat upx behavioral2/memory/1560-5-0x0000000000400000-0x000000000042F000-memory.dmp upx behavioral2/memory/1560-7-0x0000000000400000-0x000000000042F000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 5080 1468 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 384 wrote to memory of 1468 384 rundll32.exe 82 PID 384 wrote to memory of 1468 384 rundll32.exe 82 PID 384 wrote to memory of 1468 384 rundll32.exe 82 PID 1468 wrote to memory of 1560 1468 rundll32.exe 83 PID 1468 wrote to memory of 1560 1468 rundll32.exe 83 PID 1468 wrote to memory of 1560 1468 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_45c57c5b507b4606e97075a822387b2a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_45c57c5b507b4606e97075a822387b2a.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1468 -s 6323⤵
- Program crash
PID:5080
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1468 -ip 14681⤵PID:4604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
61KB
MD51e28b93df4dc13ba183d7cac665bc45e
SHA19f91ec079b5033516398e65970431602ba51647c
SHA256e6db1aa577d981ff37dffc63cf7496a94db52e27c035f59983236cf1117becaf
SHA512f133fd3ce7ddc48f090f3f94c98ea8b3b6ad017fc774c43d691176fe3f18a499de890be3aaaadd36299df41ea0f705a7375a6772409efccd11991bc49e4d7331