Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 08:59
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b545c4958d3925121ed882fd142b4fc0.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_b545c4958d3925121ed882fd142b4fc0.dll
-
Size
140KB
-
MD5
b545c4958d3925121ed882fd142b4fc0
-
SHA1
c3a4b8a8aab18d2ed16eb803d51fb1f863b07e86
-
SHA256
7dce76ad3ea326d7317bb2a41ae5330371774f2590d98b5e9654306dfd5077ac
-
SHA512
db074a5e4a029daa7a427720e58d4edca20e7f798fdd1c7110c4f421f67aa55a527afa9867ee10c7a4da8c267d76694782706f7b2db66e5b5e3c4e9847f85853
-
SSDEEP
3072:HGxATR37mcP95Y4hZwIjPhdFJIj4TI5FCGUjY0A3GM1:Hj37ZY4ldFQ5F000A3P1
Malware Config
Signatures
-
Floxif family
-
Detects Floxif payload 1 IoCs
resource yara_rule behavioral1/files/0x000d0000000122e4-1.dat floxif -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x000d0000000122e4-1.dat acprotect -
Loads dropped DLL 1 IoCs
pid Process 3068 rundll32.exe -
resource yara_rule behavioral1/files/0x000d0000000122e4-1.dat upx behavioral1/memory/3068-3-0x0000000000170000-0x000000000019E000-memory.dmp upx behavioral1/memory/3068-5-0x0000000000170000-0x000000000019E000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\Common Files\System\symsrv.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3016 wrote to memory of 3068 3016 rundll32.exe 30 PID 3016 wrote to memory of 3068 3016 rundll32.exe 30 PID 3016 wrote to memory of 3068 3016 rundll32.exe 30 PID 3016 wrote to memory of 3068 3016 rundll32.exe 30 PID 3016 wrote to memory of 3068 3016 rundll32.exe 30 PID 3016 wrote to memory of 3068 3016 rundll32.exe 30 PID 3016 wrote to memory of 3068 3016 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b545c4958d3925121ed882fd142b4fc0.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b545c4958d3925121ed882fd142b4fc0.dll,#12⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD580db2a010f1ba6a8dc1b661366ad8b45
SHA19bdb5f4c13477c204b8e33b24c86e6ad04e970a2
SHA2566a19b9c58cdab7ffb01bf5db948ae31ec69367fe24c65c845028a20b5b9be7d8
SHA512dc2a7c77285b7952714250fd5ec84120ef81bf5978800b8c692ca58a1d3761079ea08152882b3d06c1396c4394e2cf9e7f1b314c3cb13e2733b48ad3029ba7e1