Analysis
-
max time kernel
94s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 04:30
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_473d0eea52e4c9128926811065a55b60.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_473d0eea52e4c9128926811065a55b60.dll
-
Size
223KB
-
MD5
473d0eea52e4c9128926811065a55b60
-
SHA1
06c1db283660dd057bf846aa6cb444b74c25eb0f
-
SHA256
85091bfad769f95f9048f3b81845fc470c37adcd667a18b6226c47e91de7604a
-
SHA512
52e7f78330d42c768304c86664fb9fa7029517f7025334ac345b9116ec572938eba1cd882ee3955c94afc297e5da748cd4cddf49851a1cfa8596480860c5c08f
-
SSDEEP
3072:qmY2UXXqE+A6/Q2BBzrwj9o+vNNbbVweMh5R0MgTBqCxjdaK+3xPWzgjLwwEJo+j:YKEaXwj7BMhv0JBhjgK+pWBui+8
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 1536 rundll32mgr.exe -
Loads dropped DLL 1 IoCs
pid Process 1536 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral2/memory/1536-6-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1536-11-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1536-14-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1536-15-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1536-13-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1536-8-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral2/memory/1536-7-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4904 1536 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1608 rundll32.exe 1608 rundll32.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 1536 rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3944 wrote to memory of 1608 3944 rundll32.exe 85 PID 3944 wrote to memory of 1608 3944 rundll32.exe 85 PID 3944 wrote to memory of 1608 3944 rundll32.exe 85 PID 1608 wrote to memory of 1536 1608 rundll32.exe 86 PID 1608 wrote to memory of 1536 1608 rundll32.exe 86 PID 1608 wrote to memory of 1536 1608 rundll32.exe 86
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_473d0eea52e4c9128926811065a55b60.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_473d0eea52e4c9128926811065a55b60.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1536 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1536 -s 4404⤵
- Program crash
PID:4904
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1536 -ip 15361⤵PID:3840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
113KB
MD5d26092af969610dab56e02649ecae88d
SHA1cd450ff4b645acd188fa1f9e9c16a972c0e99f87
SHA256e4fedb771fd949517cbf3392c9f36be599bf16726a4702cb960a1f4845c39a71
SHA5128c87bf4318089dc03d7c60b1d1f04ac46333f792ca37bd3a0ca832dc22ae56dc8b0a473154706ef58812c70cf99d6fee877ab4984ce973eaaa3e5d1525730b05