Analysis
-
max time kernel
93s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
30/01/2025, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_639f033f6712376c3127d7e391c64a6e.dll
Resource
win7-20240708-en
General
-
Target
JaffaCakes118_639f033f6712376c3127d7e391c64a6e.dll
-
Size
152KB
-
MD5
639f033f6712376c3127d7e391c64a6e
-
SHA1
54ae750743121c768e78f1f5b5bf5dbed9e2655a
-
SHA256
41c4008040780a6d82c325d0d8115ffd188203595a4b164ceba956878e3efcea
-
SHA512
ee9e39a15c2faa7651af1f601061ac66667c40853b2f1e2970cb46840bbab0abb46ddeb006cd1b05130cd03b5fba78a80c25ec1b8e3c44a773b6c889a51b8c61
-
SSDEEP
3072:XdSdQ5T3W24GC09adtRlOusvJckiaJP+BfN1:XdSInoHdtRlXsBckhJP+Vj
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3472 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/files/0x000a000000023be4-3.dat upx behavioral2/memory/3472-4-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/3472-8-0x0000000000400000-0x000000000045D000-memory.dmp upx -
Program crash 2 IoCs
pid pid_target Process procid_target 3400 3472 WerFault.exe 86 4628 852 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 208 wrote to memory of 852 208 rundll32.exe 83 PID 208 wrote to memory of 852 208 rundll32.exe 83 PID 208 wrote to memory of 852 208 rundll32.exe 83 PID 852 wrote to memory of 3472 852 rundll32.exe 86 PID 852 wrote to memory of 3472 852 rundll32.exe 86 PID 852 wrote to memory of 3472 852 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_639f033f6712376c3127d7e391c64a6e.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_639f033f6712376c3127d7e391c64a6e.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3472 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3472 -s 2644⤵
- Program crash
PID:3400
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 6083⤵
- Program crash
PID:4628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3472 -ip 34721⤵PID:2316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 852 -ip 8521⤵PID:4804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD518a278ae0b09685809131a3db93fa729
SHA14be15cabab2fb0bba9729805c0992039f6b2f79d
SHA256e6a62fc180bd2ea1fe97fdb185976e82b2ba65f99aedcc0bd22a6f9e15f0660e
SHA512c485b54e23a8522d2a9cec24532ddd0deb8eee12a592d817a0d688c044fc67c5dd56d89b5d8d6c0e81817357220c3557d67d0f2bdb0731db05ec2ee62ef3aac1