Analysis
-
max time kernel
95s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 14:09
Behavioral task
behavioral1
Sample
JaffaCakes118_4bbb80e7099b9322b8eb2d7a4e1fb6d1.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_4bbb80e7099b9322b8eb2d7a4e1fb6d1.dll
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_4bbb80e7099b9322b8eb2d7a4e1fb6d1.dll
-
Size
109KB
-
MD5
4bbb80e7099b9322b8eb2d7a4e1fb6d1
-
SHA1
7932d916fe6ac7c1ac99bd3402b11ba0c02d382a
-
SHA256
cb831f67bfdfb408fe18ddeacf31a36cb3b3285850d335d68c92bdc7ad8a2f8e
-
SHA512
7da90717890720a786988805475fb6827f4ed36a7bc86dcda792e650868e2d4287d790307b49d154421a8dc16012afcb06766f2e47705c284e33d918a088d2d9
-
SSDEEP
1536:QmTUSV4SibNr8YIaT024cKau2f9d0RKd+NvP+mHm:kS2SiyYI924Wug9d0y+lP+mHm
Malware Config
Signatures
-
Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\BITS\Parameters\ServiceDll = "C:\\Windows\\system32\\qmgr.dll" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\qmgr.dll rundll32.exe File created C:\Windows\SysWOW64\qmgr.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1132 wrote to memory of 1616 1132 rundll32.exe 81 PID 1132 wrote to memory of 1616 1132 rundll32.exe 81 PID 1132 wrote to memory of 1616 1132 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4bbb80e7099b9322b8eb2d7a4e1fb6d1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_4bbb80e7099b9322b8eb2d7a4e1fb6d1.dll,#12⤵
- Server Software Component: Terminal Services DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1616
-