Analysis
-
max time kernel
134s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 02:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_621b397173f97eee1cb9fb4a95871270.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_621b397173f97eee1cb9fb4a95871270.dll
-
Size
91KB
-
MD5
621b397173f97eee1cb9fb4a95871270
-
SHA1
f5a3cb20ad5e3716342eeeb959182c09200ff948
-
SHA256
b3f03ea75b077ceb00900446565ebd141a96dc7cc3e67735fd81631d9876b83b
-
SHA512
fb2d1d6a2d8d55464a8c0a1d2c09fc6f720bac075c07a0090eafe49c98040b1cd6a3aaf935071840b52d9b0d53aeaa82b69ea286fd800b92cedf805db816f675
-
SSDEEP
1536:0PdRzeNwp25MY8nC83+LJmEDTeVUwpibblwzmfSHYdvoZe0X+1Qexk7OM2soPzai:0P3EneC83AJm0Tt+uwzmaHow/X8nM2sU
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 2488 rundll32Srv.exe 2876 DesktopLayer.exe -
Loads dropped DLL 2 IoCs
pid Process 2816 rundll32.exe 2488 rundll32Srv.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32Srv.exe rundll32.exe -
resource yara_rule behavioral1/files/0x000a000000012263-3.dat upx behavioral1/memory/2488-8-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2488-12-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2876-18-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2876-20-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2876-23-0x0000000000400000-0x000000000042E000-memory.dmp upx behavioral1/memory/2876-25-0x0000000000400000-0x000000000042E000-memory.dmp upx -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\px6326.tmp rundll32Srv.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rundll32Srv.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2712 2816 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32Srv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "441946801" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4F30BF01-C8B1-11EF-8CE5-7A300BFEC721} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2876 DesktopLayer.exe 2876 DesktopLayer.exe 2876 DesktopLayer.exe 2876 DesktopLayer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2988 iexplore.exe 2988 iexplore.exe 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE 1660 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2816 2956 rundll32.exe 30 PID 2956 wrote to memory of 2816 2956 rundll32.exe 30 PID 2956 wrote to memory of 2816 2956 rundll32.exe 30 PID 2956 wrote to memory of 2816 2956 rundll32.exe 30 PID 2956 wrote to memory of 2816 2956 rundll32.exe 30 PID 2956 wrote to memory of 2816 2956 rundll32.exe 30 PID 2956 wrote to memory of 2816 2956 rundll32.exe 30 PID 2816 wrote to memory of 2488 2816 rundll32.exe 31 PID 2816 wrote to memory of 2488 2816 rundll32.exe 31 PID 2816 wrote to memory of 2488 2816 rundll32.exe 31 PID 2816 wrote to memory of 2488 2816 rundll32.exe 31 PID 2816 wrote to memory of 2712 2816 rundll32.exe 32 PID 2816 wrote to memory of 2712 2816 rundll32.exe 32 PID 2816 wrote to memory of 2712 2816 rundll32.exe 32 PID 2816 wrote to memory of 2712 2816 rundll32.exe 32 PID 2488 wrote to memory of 2876 2488 rundll32Srv.exe 33 PID 2488 wrote to memory of 2876 2488 rundll32Srv.exe 33 PID 2488 wrote to memory of 2876 2488 rundll32Srv.exe 33 PID 2488 wrote to memory of 2876 2488 rundll32Srv.exe 33 PID 2876 wrote to memory of 2988 2876 DesktopLayer.exe 34 PID 2876 wrote to memory of 2988 2876 DesktopLayer.exe 34 PID 2876 wrote to memory of 2988 2876 DesktopLayer.exe 34 PID 2876 wrote to memory of 2988 2876 DesktopLayer.exe 34 PID 2988 wrote to memory of 1660 2988 iexplore.exe 35 PID 2988 wrote to memory of 1660 2988 iexplore.exe 35 PID 2988 wrote to memory of 1660 2988 iexplore.exe 35 PID 2988 wrote to memory of 1660 2988 iexplore.exe 35
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_621b397173f97eee1cb9fb4a95871270.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_621b397173f97eee1cb9fb4a95871270.dll,#12⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\rundll32Srv.exeC:\Windows\SysWOW64\rundll32Srv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2988 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1660
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 2363⤵
- Program crash
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5450f35bc7c30338f5c24c810820afea8
SHA1cab62dac154750a3a31b6e86e68ce26f827db519
SHA25626be85449f037b40a9dcbebf505f8130e5edf9bac51856f08ebf7df8aa2a6030
SHA512c9bd0798c560662fd5fb006784a278f00bca1f12525303194f8b98437562387ec34c99590c5ff19542ce3b9b0a2184599404322a6117230a85ef462dfa8abf3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55d5c06fcf478f29b0848003c1ab9fab8
SHA140f23e82e1e7af32a780f3d5c7ad8ba2ed5691b1
SHA2564417f36533236b2dfe24d091e9a7f575c908dc6fafcabd0c16d52290628a6960
SHA5121a30f7b459d6a2caa61f042e999e5726f08482ef3ce4fbead5d4ad87fc7e439c4fbd80c077ee6d139cfa098d0b87c4bbc350be68ed045d06c98f88c0fdfaf567
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5da317b335869afae74501b1f51ff9143
SHA1aee7a0248f5665200f0b1953adffed8d02c07a77
SHA2561792981488394b8ec4131f8adf1598eb4c1ffcbfe9316479d4300f5fe39c14ac
SHA512aa5ab74fffb1aed76fbe6e717c45dbba928714132fdbc3ac0d2c7865ea79c5ebc1bc14299fb9e2d36743d8360803cc7ef7ff2f7dcf15196db1cd737279c3ed04
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59503e8e122b4170ce8d464f2cbe69930
SHA1707069c7abd79f0570482cca5f23ed0643d2744e
SHA2564e1c2066c239939260ff608dd91cb9497f9a0615fd34e79219f8e05a5cd6dcbf
SHA5129db02412610eff708f27086eb8bf94cf010bdcdd723021386bacb4becdf2c9b221dc58cae61018d3cd12f67dfa08fd1a8697a6b304b21f8cd8accda3bc63a940
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1d0f059c069fb834697b9dd9cf8df83
SHA1ff2097d11bd54b34953ad6a04154fd3fa0dea2f8
SHA2567e5ff7c7aff2642f92dafad85b20861493403faf47ceaa23e7fc6e4b45a39e91
SHA5128048177735bcb09cfb272742c5be43cba5682078714df6bbe737c02f75e889d71eec1aa08b075e102d48d043bc6512049b845b2e5c4f6bc97acfc18a8971f56c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c2cba547750d39e45fcc0a26bb7cd5cd
SHA14eba4c0777535144d4f608d8493889f853c63517
SHA256c63a5c45341e29f59d04a36fdd1916a51d3957ca91e340141d2af16926e259d6
SHA51262789538d1af692bb6eefe26067fd3ee73acd53810c605c20641666976699b815b1dc00f0399393c3916c795ec05d9b59ec217e01b8d3058757fc7ace33ae098
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ecd2953d39affb71940911f9dda7a4b6
SHA1fba1c78de8b585db2fce30eb0b953bedf981113f
SHA25637931e342338b0e134b59e2655679589ecf6bcc61ab5bbb52a6db697280cc231
SHA5128cc597db0874d27b17feea73b34dda73f2a823c7ac0c3566bbd6fa8164dca2b531d42e25fb47fcd1133391fa8c0738151ecb7c4233b56472516bce2a6d8f538e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c72fa0d2fab812ee019a4aaf38038b89
SHA19afc9f893e9ddaca065a884c27d7749f1d404f5c
SHA25667d7538e6a6ee928fa781a0218c32d04d52ffc0819743c4f3ffdd3971c15c348
SHA5121c1a4f32e106a2459aba9365c146cecaf38ce0c1d8512a9193567f3a2b443d49a55881c3b14e4e37da8cf743c045d2d28252acd08715262784eef9079c5c8b20
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e6cba0f57622f926c2c07b79a801dba1
SHA13c3b61565e41b060f897d386e1c5103152650405
SHA2566a92e7d808904bb3eb757e5b85ffe068d3383a20568c8eb002a097652bf5f5ea
SHA512e72154a7b362e9d010829c6e69fcf58b4c1ce24927fcedb669a0ca5a3c617159936cf6c9948599c081636f7f2efb20d6992ae5ac29c15d922f2234b6e1e4127c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD541ad6cdff1643d0412cf4f09bdf1f98b
SHA1a2f71429e89c3874db45541aacfecaba01a23c4c
SHA256617495ef678d8f95e47b2431915346a05495722e01b4c0c55831adc4f448808f
SHA5120e00458816a285dd6708bcf866f7459334aab315dee776a2ff4a9e87939708977e8a8969e376acf7c041e1c17a257e4d075fb127226b7796bd60795f3a52b4da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56396efce30cadbbd08b55a1c5ea42323
SHA165d7ee6bc75cea1d68c7ff4721b7aececdc5c36b
SHA256595ff9804d8594c6496216c0270542175b53526ad1778331917a396a7b09b88c
SHA5126f9a9db5651e735284c6d525192f5853b9c51b1a4a190a6ed1c44423cc436314a351fae17f091678fc1d178a032146321b0d4f5e6d3ad6c2d50bef22bac1a352
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5226f8e9b66152b05187422ba12a8f1ec
SHA1e5ed0c06018e84e8a43ea9a2cf42995cb1e8125c
SHA256c0a12135f0e7f51cb41cacd977782718115944da1ffacbc8789c26b337dd010e
SHA51204b7c49c796a0ea2c12e62787edbe42573207d7cd5b3fa714a34b96624897f1018351ae169eef7c48d1d72eea66bad39b6e861cd0e732968e3978812c36f4f53
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ad95795b773f3d543f4731ca40b88630
SHA1ba1af5bfd22b260a18fcc453ca33beb9fb7c8c27
SHA2564c464355177b4a7419120a57df5d4deccbf5d6a04085ada9e6450ea5d0a50154
SHA51263394d5fc8200e67774c5ce7743c7bd2fc1d474d3dcd13b0b3e282de1229cd36c004fe4b2dcae0b4ce501b175dc7c132ef767a479805d5be8d2aa003d84c5cec
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518737de800f154ab16be922057f97a50
SHA195659190d8927a37758fef02edfdd182824a16d4
SHA2563ca64bdb73c198386ce3f6e06e2dc6d3bdb680e2cc7c33c41b79947ac9ae885a
SHA512c9f70e0f6c52bf8534a3d4a0c4a30d417d3f4ed32851e2cb5940a6fd5d0a7cf98a0ec504f5bd4890b9b00320f47cdcdb61f89ad9f71735dbbaa805c301ce743b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD587d7d1c8564c70e007ba22993eeae48c
SHA1a3e396bcaa22d14d22b6609f691ca88fcf7df40a
SHA256b25c37c1a5f18045c9a74da36af6da0de4181bdb926017aac423fc4aab99da5b
SHA51283c33109a52ac4d12961db0240de6a386d1b2ee1173cd7b4187fad8a270d0c6ea2e5b9b03428516f5b09dd5da8207090448e35f6284107d0377d1527cc1badc0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
55KB
MD5ff5e1f27193ce51eec318714ef038bef
SHA1b4fa74a6f4dab3a7ba702b6c8c129f889db32ca6
SHA256fd6c69c345f1e32924f0a5bb7393e191b393a78d58e2c6413b03ced7482f2320
SHA512c9d654ead35f40eea484a3dc5b5d0a44294b9e7b41a9bacdafdd463d3de9daa2a43237a5f113f6a9c8ea5e1366823fd3d83da18cd8197aa69a55e9f345512a7a