Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 06:32
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_47ded890f9937867aa31afe6bda2d66c.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_47ded890f9937867aa31afe6bda2d66c.dll
-
Size
528KB
-
MD5
47ded890f9937867aa31afe6bda2d66c
-
SHA1
76a14b20830760c4caefafd69a907cefeb0093f9
-
SHA256
16d01f2db892caaa76723644d64768def9b4dc6520b4b4b5455544d4bc4a6409
-
SHA512
01c7e9a8051c9e32a836338ed5a8ec42f812541de756983c456fab2d53732cbf579fdd7d6d1245466e6b17610eef960ffeb94dc02651715e9dbace38a64c694a
-
SSDEEP
12288:gV7LMzw56Wx1Dk/qon6xyYhgPFaUVltwC1UOLMTQi:K1oC3yWgPFzMTQi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3128 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000c000000023bbe-3.dat upx behavioral2/memory/3128-5-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral2/memory/3128-7-0x0000000000400000-0x0000000000463000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4004 3128 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2500 wrote to memory of 212 2500 rundll32.exe 83 PID 2500 wrote to memory of 212 2500 rundll32.exe 83 PID 2500 wrote to memory of 212 2500 rundll32.exe 83 PID 212 wrote to memory of 3128 212 rundll32.exe 84 PID 212 wrote to memory of 3128 212 rundll32.exe 84 PID 212 wrote to memory of 3128 212 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_47ded890f9937867aa31afe6bda2d66c.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_47ded890f9937867aa31afe6bda2d66c.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3128 -s 2644⤵
- Program crash
PID:4004
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3128 -ip 31281⤵PID:2424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD55da46f63cf9852e3c7a756f51aa23eb4
SHA15475fd10272f2141edf7b4a0cfbd428526e47e94
SHA256678e3295d29dfd132203021da7ce63b18eb301958d6848f5666ad388a0e2505f
SHA512b30e1871428c184f1abfab2da1f6568b11f19eed8af8f4532ff1be6da951242e86d486f8fc16e5ec37e7064b106f4916a03e0067b3def55e260cc2cda9dd4da0