Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-12-2024 02:14

General

  • Target

    fe096f306f22da4145424fa903585b9f_JaffaCakes118.dll

  • Size

    1.3MB

  • MD5

    fe096f306f22da4145424fa903585b9f

  • SHA1

    dc3193c3fdb332121e6c11407381db34e946ccfe

  • SHA256

    c66b2aaa9fff0906e2cdcfbeda4c0b1f848c117e6c4579c0918bb4a6cf18080e

  • SHA512

    31a70e0be53328314e5e3c9d2f6677205a9f47939910cd89a6a95f81abedcd257d318a8b4fb57433153a2877a84075fdd4546bc1a790567588f1deaf7c8c0635

  • SSDEEP

    24576:mFOoCvSZSNnCantpaOahlOr9QzHDM9ukxvIDyyG5Rdo/1Xt6pBRuGX+ftAAb:zmaujlS6HQRZIWyG574Nkp21

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 46 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fe096f306f22da4145424fa903585b9f_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3092
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fe096f306f22da4145424fa903585b9f_JaffaCakes118.dll,#1
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:5024
        • C:\Program Files (x86)\Microsoft\WaterMark.exe
          "C:\Program Files (x86)\Microsoft\WaterMark.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:5060
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\system32\svchost.exe
            5⤵
              PID:4860
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4860 -s 208
                6⤵
                • Program crash
                PID:2772
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:3440
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3440 CREDAT:17410 /prefetch:2
                6⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:2232
            • C:\Program Files\Internet Explorer\iexplore.exe
              "C:\Program Files\Internet Explorer\iexplore.exe"
              5⤵
              • Modifies Internet Explorer settings
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1496
              • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1496 CREDAT:17410 /prefetch:2
                6⤵
                • System Location Discovery: System Language Discovery
                • Modifies Internet Explorer settings
                • Suspicious use of SetWindowsHookEx
                PID:1304
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4860 -ip 4860
      1⤵
        PID:1116

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        471B

        MD5

        5e99ec80bb4e60401972729dff7db4f2

        SHA1

        a68a2f47614d8afd1b7afd1e0620d32cd393e2c0

        SHA256

        6ac6e0c6b415580d28c082f0e59f45289379890a167c088a557d3e2578b424e0

        SHA512

        7670c7e91ae9555458275effc570e107c9ae43b02e65f9200b773f9139dfe228faf55f5c4ac5d9d713d0231e16c129baf1c289534b42ac7b4d042f370240c654

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776

        Filesize

        404B

        MD5

        54827af79fc7ff4a1212d4083f52acb3

        SHA1

        e7d0963e6e3cad733d84372f52c7d6725ee37ba5

        SHA256

        f0ba32d4e5def42605a329a05b742e2f0fb8a260b1ad910fc5a958407d0c7a55

        SHA512

        ea873fa08a6de147f00cb1392365102e5cb19c2e707489dd25a13d69450806075f0971151bbe8e7e4ac1d71da1c888de627f44c5b1c0f382bb0409a59a97f524

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0B3F96A2-BDAF-11EF-B9D5-FAA11E730504}.dat

        Filesize

        3KB

        MD5

        a89f6e654904dfb283fd8f04910eca5e

        SHA1

        6046ba3d67f4ddb8aa1a10a2d56645cc7f797237

        SHA256

        2aab53c97cfc0ee9af7ab24c2e63541e396ad2de6cf9130619118f5ae4f8d366

        SHA512

        3a12e95d7f194b368b462bbb4a6437df04c24df6ce38e07e29808b3e83b5ae44987b62a1b71937e255e41c9ff14633b725cd944e35e214fd84ca736283ba243c

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{0B41FA26-BDAF-11EF-B9D5-FAA11E730504}.dat

        Filesize

        5KB

        MD5

        7c0960cc9dad7b436d38729a50a793b7

        SHA1

        354a68ec3ad196e9fca8a88b5c918d0019d5236e

        SHA256

        098c7ebd59bb59cbbfb6f69de841a3cf168386b7171d40896d4c2e5958546eba

        SHA512

        581f218241b45d773dc20c4548d7fb88a101650bead59ef2c841381cc3011657bb021c98a65c574f0252ac10957492538f9ca030a6727da12fbabe3b339ef343

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\verA8A.tmp

        Filesize

        15KB

        MD5

        1a545d0052b581fbb2ab4c52133846bc

        SHA1

        62f3266a9b9925cd6d98658b92adec673cbe3dd3

        SHA256

        557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

        SHA512

        bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FQRZN8O7\suggestions[1].en-US

        Filesize

        17KB

        MD5

        5a34cb996293fde2cb7a4ac89587393a

        SHA1

        3c96c993500690d1a77873cd62bc639b3a10653f

        SHA256

        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

        SHA512

        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

      • C:\Windows\SysWOW64\rundll32mgr.exe

        Filesize

        60KB

        MD5

        94f2f6ffbba8e7644668b51b39983916

        SHA1

        63357bbdf90101969117983dbc0d4ed0e713c4d7

        SHA256

        ede7603855cb37082c241c720a6650988c684eb3bcb263e5dd7b457458940fed

        SHA512

        d04430ceac70c6fa71d07d9ee82ac2bb5e6c0641d5c9e7e5a3ed39d342e8b198f367676516a55f0653e0b88635a027b9ad220e223145b8be8df281bb6faf7156

      • memory/3004-0-0x0000000074C90000-0x0000000074DEB000-memory.dmp

        Filesize

        1.4MB

      • memory/3004-60-0x0000000074C90000-0x0000000074DEB000-memory.dmp

        Filesize

        1.4MB

      • memory/4860-32-0x00000000003B0000-0x00000000003B1000-memory.dmp

        Filesize

        4KB

      • memory/4860-33-0x0000000000390000-0x0000000000391000-memory.dmp

        Filesize

        4KB

      • memory/5024-10-0x00000000001A0000-0x00000000001A1000-memory.dmp

        Filesize

        4KB

      • memory/5024-5-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/5024-9-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/5024-11-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/5024-12-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/5024-13-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/5024-7-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/5024-6-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/5060-20-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/5060-34-0x0000000000070000-0x0000000000071000-memory.dmp

        Filesize

        4KB

      • memory/5060-35-0x0000000077382000-0x0000000077383000-memory.dmp

        Filesize

        4KB

      • memory/5060-40-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/5060-36-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/5060-29-0x0000000077382000-0x0000000077383000-memory.dmp

        Filesize

        4KB

      • memory/5060-31-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/5060-28-0x0000000000400000-0x0000000000421000-memory.dmp

        Filesize

        132KB

      • memory/5060-27-0x0000000002DA0000-0x0000000002DA1000-memory.dmp

        Filesize

        4KB