Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30/01/2025, 12:59
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_62fa7bf0b53eef966ceb6569560cfc18.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_62fa7bf0b53eef966ceb6569560cfc18.dll
-
Size
221KB
-
MD5
62fa7bf0b53eef966ceb6569560cfc18
-
SHA1
3f6cef55afd05452f4c481b48f48619a123e4af4
-
SHA256
6bb295b59971a681790dcd4ef9a8ceae3f3b9e1786b80b05730884b7120363e5
-
SHA512
c24fae94b312a7c48e374e098350e238e1a30b0cad9f765055bed3d64b31637db294201c7d1473ade6df9b8ceca690d710e0c27b7d252dabfc48986f906ad509
-
SSDEEP
3072:dYhFghbQfbEmPWE55Ds7ryI0qm1KLA3lBtZO8Low3nDBUrRYcj:dBzcjXsHmOIBtZOsBnWt3j
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1552 rundll32mgr.exe -
Loads dropped DLL 2 IoCs
pid Process 804 rundll32.exe 804 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1552 rundll32mgr.exe -
Suspicious behavior: MapViewOfSection 26 IoCs
pid Process 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe 1552 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1552 rundll32mgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 804 2108 rundll32.exe 31 PID 2108 wrote to memory of 804 2108 rundll32.exe 31 PID 2108 wrote to memory of 804 2108 rundll32.exe 31 PID 2108 wrote to memory of 804 2108 rundll32.exe 31 PID 2108 wrote to memory of 804 2108 rundll32.exe 31 PID 2108 wrote to memory of 804 2108 rundll32.exe 31 PID 2108 wrote to memory of 804 2108 rundll32.exe 31 PID 804 wrote to memory of 1552 804 rundll32.exe 32 PID 804 wrote to memory of 1552 804 rundll32.exe 32 PID 804 wrote to memory of 1552 804 rundll32.exe 32 PID 804 wrote to memory of 1552 804 rundll32.exe 32 PID 1552 wrote to memory of 372 1552 rundll32mgr.exe 3 PID 1552 wrote to memory of 372 1552 rundll32mgr.exe 3 PID 1552 wrote to memory of 372 1552 rundll32mgr.exe 3 PID 1552 wrote to memory of 372 1552 rundll32mgr.exe 3 PID 1552 wrote to memory of 372 1552 rundll32mgr.exe 3 PID 1552 wrote to memory of 372 1552 rundll32mgr.exe 3 PID 1552 wrote to memory of 372 1552 rundll32mgr.exe 3 PID 1552 wrote to memory of 380 1552 rundll32mgr.exe 4 PID 1552 wrote to memory of 380 1552 rundll32mgr.exe 4 PID 1552 wrote to memory of 380 1552 rundll32mgr.exe 4 PID 1552 wrote to memory of 380 1552 rundll32mgr.exe 4 PID 1552 wrote to memory of 380 1552 rundll32mgr.exe 4 PID 1552 wrote to memory of 380 1552 rundll32mgr.exe 4 PID 1552 wrote to memory of 380 1552 rundll32mgr.exe 4 PID 1552 wrote to memory of 420 1552 rundll32mgr.exe 5 PID 1552 wrote to memory of 420 1552 rundll32mgr.exe 5 PID 1552 wrote to memory of 420 1552 rundll32mgr.exe 5 PID 1552 wrote to memory of 420 1552 rundll32mgr.exe 5 PID 1552 wrote to memory of 420 1552 rundll32mgr.exe 5 PID 1552 wrote to memory of 420 1552 rundll32mgr.exe 5 PID 1552 wrote to memory of 420 1552 rundll32mgr.exe 5 PID 1552 wrote to memory of 464 1552 rundll32mgr.exe 6 PID 1552 wrote to memory of 464 1552 rundll32mgr.exe 6 PID 1552 wrote to memory of 464 1552 rundll32mgr.exe 6 PID 1552 wrote to memory of 464 1552 rundll32mgr.exe 6 PID 1552 wrote to memory of 464 1552 rundll32mgr.exe 6 PID 1552 wrote to memory of 464 1552 rundll32mgr.exe 6 PID 1552 wrote to memory of 464 1552 rundll32mgr.exe 6 PID 1552 wrote to memory of 480 1552 rundll32mgr.exe 7 PID 1552 wrote to memory of 480 1552 rundll32mgr.exe 7 PID 1552 wrote to memory of 480 1552 rundll32mgr.exe 7 PID 1552 wrote to memory of 480 1552 rundll32mgr.exe 7 PID 1552 wrote to memory of 480 1552 rundll32mgr.exe 7 PID 1552 wrote to memory of 480 1552 rundll32mgr.exe 7 PID 1552 wrote to memory of 480 1552 rundll32mgr.exe 7 PID 1552 wrote to memory of 488 1552 rundll32mgr.exe 8 PID 1552 wrote to memory of 488 1552 rundll32mgr.exe 8 PID 1552 wrote to memory of 488 1552 rundll32mgr.exe 8 PID 1552 wrote to memory of 488 1552 rundll32mgr.exe 8 PID 1552 wrote to memory of 488 1552 rundll32mgr.exe 8 PID 1552 wrote to memory of 488 1552 rundll32mgr.exe 8 PID 1552 wrote to memory of 488 1552 rundll32mgr.exe 8 PID 1552 wrote to memory of 584 1552 rundll32mgr.exe 9 PID 1552 wrote to memory of 584 1552 rundll32mgr.exe 9 PID 1552 wrote to memory of 584 1552 rundll32mgr.exe 9 PID 1552 wrote to memory of 584 1552 rundll32mgr.exe 9 PID 1552 wrote to memory of 584 1552 rundll32mgr.exe 9 PID 1552 wrote to memory of 584 1552 rundll32mgr.exe 9 PID 1552 wrote to memory of 584 1552 rundll32mgr.exe 9 PID 1552 wrote to memory of 664 1552 rundll32mgr.exe 10 PID 1552 wrote to memory of 664 1552 rundll32mgr.exe 10 PID 1552 wrote to memory of 664 1552 rundll32mgr.exe 10 PID 1552 wrote to memory of 664 1552 rundll32mgr.exe 10
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:372
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:584
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1676
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1652
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:664
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:748
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:808
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1324
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:844
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R4⤵PID:2328
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:988
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:296
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:108
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:532
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1240
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1088
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:2460
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:2160
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:480
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:488
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:380
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1388
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62fa7bf0b53eef966ceb6569560cfc18.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62fa7bf0b53eef966ceb6569560cfc18.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1552
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD50a81115512175671ffc16056ef33a871
SHA1ba068cf980d0433f1659ea31e56dd6eba5b09ece
SHA25679aaee3404f0c2b8e9a1d5affc3f6567fd200a74f2bfc3b38c7661b39dd7ce28
SHA51253cd70701c0cf274db453b6e15f2c4116ac19a3e4237ce8a007caf83e7234c1534e74a7438f8ab684c896aa1d72b41052a74e42f020edb48a3db5fed02faef63