Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 08:10
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6b4b10e0f21a3f0ddb5dda5f6973a275.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_6b4b10e0f21a3f0ddb5dda5f6973a275.dll
-
Size
304KB
-
MD5
6b4b10e0f21a3f0ddb5dda5f6973a275
-
SHA1
032e71848ad28396274514227fde86df3308a8da
-
SHA256
ebbe606610e9dc3743fde753ada6fbaa34b7aa230e585eedb2bebb1154cb6ebe
-
SHA512
4cc68a9a83a3417fb659df886673fc0f28346a5a7a08cedd54fe1e4ba81069deb033e243b2638fc83ee4d4adeda245dd6fb6bafd98c3050ad850617446b43a1b
-
SSDEEP
6144:340dRt+g0QPekyswLCwuSr08hKZFXZoMq3+:o07h0igTx9nXMO+
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2364 regsvr32mgr.exe -
Loads dropped DLL 1 IoCs
pid Process 2364 regsvr32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
resource yara_rule behavioral2/memory/2364-6-0x0000000000400000-0x0000000000483000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 1644 2364 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Modifies registry class 46 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{26C39F7C-4B8A-487B-8785-3918529D9144} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{26C39F7C-4B8A-487B-8785-3918529D9144}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{26C39F7C-4B8A-487B-8785-3918529D9144}\ = "IRemoteService" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hpqesrvc.RemoteService.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hpqesrvc.RemoteService.1\CLSID\ = "{4F629C24-4905-4B7A-981D-1C4F9FCD5D5E}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hpqesrvc.RemoteService\ = "RemoteService Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F629C24-4905-4B7A-981D-1C4F9FCD5D5E}\ = "RemoteService Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F629C24-4905-4B7A-981D-1C4F9FCD5D5E}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{26C39F7C-4B8A-487B-8785-3918529D9144}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD6CA4BD-B646-4495-A8A9-9FA4AE62C6D8}\1.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{26C39F7C-4B8A-487B-8785-3918529D9144}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{26C39F7C-4B8A-487B-8785-3918529D9144}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hpqesrvc.RemoteService.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hpqesrvc.RemoteService\CurVer\ = "Hpqesrvc.RemoteService.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F629C24-4905-4B7A-981D-1C4F9FCD5D5E}\TypeLib\ = "{DD6CA4BD-B646-4495-A8A9-9FA4AE62C6D8}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD6CA4BD-B646-4495-A8A9-9FA4AE62C6D8}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD6CA4BD-B646-4495-A8A9-9FA4AE62C6D8}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F629C24-4905-4B7A-981D-1C4F9FCD5D5E}\ProgID\ = "Hpqesrvc.RemoteService.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD6CA4BD-B646-4495-A8A9-9FA4AE62C6D8}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hpqesrvc.RemoteService regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hpqesrvc.RemoteService\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F629C24-4905-4B7A-981D-1C4F9FCD5D5E}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD6CA4BD-B646-4495-A8A9-9FA4AE62C6D8}\1.0\ = "hpqesrvc 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD6CA4BD-B646-4495-A8A9-9FA4AE62C6D8}\1.0\0\win32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F629C24-4905-4B7A-981D-1C4F9FCD5D5E}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F629C24-4905-4B7A-981D-1C4F9FCD5D5E}\VersionIndependentProgID\ = "Hpqesrvc.RemoteService" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F629C24-4905-4B7A-981D-1C4F9FCD5D5E}\InprocServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_6b4b10e0f21a3f0ddb5dda5f6973a275.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{26C39F7C-4B8A-487B-8785-3918529D9144} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{26C39F7C-4B8A-487B-8785-3918529D9144}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{26C39F7C-4B8A-487B-8785-3918529D9144}\TypeLib\ = "{DD6CA4BD-B646-4495-A8A9-9FA4AE62C6D8}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hpqesrvc.RemoteService\CLSID\ = "{4F629C24-4905-4B7A-981D-1C4F9FCD5D5E}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F629C24-4905-4B7A-981D-1C4F9FCD5D5E} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD6CA4BD-B646-4495-A8A9-9FA4AE62C6D8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD6CA4BD-B646-4495-A8A9-9FA4AE62C6D8}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{26C39F7C-4B8A-487B-8785-3918529D9144}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD6CA4BD-B646-4495-A8A9-9FA4AE62C6D8}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{26C39F7C-4B8A-487B-8785-3918529D9144}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{DD6CA4BD-B646-4495-A8A9-9FA4AE62C6D8}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_6b4b10e0f21a3f0ddb5dda5f6973a275.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{26C39F7C-4B8A-487B-8785-3918529D9144}\ = "IRemoteService" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{26C39F7C-4B8A-487B-8785-3918529D9144}\TypeLib\ = "{DD6CA4BD-B646-4495-A8A9-9FA4AE62C6D8}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Hpqesrvc.RemoteService.1\ = "RemoteService Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Hpqesrvc.RemoteService\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F629C24-4905-4B7A-981D-1C4F9FCD5D5E}\VersionIndependentProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F629C24-4905-4B7A-981D-1C4F9FCD5D5E}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4F629C24-4905-4B7A-981D-1C4F9FCD5D5E}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{26C39F7C-4B8A-487B-8785-3918529D9144}\ProxyStubClsid32 regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4504 wrote to memory of 3156 4504 regsvr32.exe 82 PID 4504 wrote to memory of 3156 4504 regsvr32.exe 82 PID 4504 wrote to memory of 3156 4504 regsvr32.exe 82 PID 3156 wrote to memory of 2364 3156 regsvr32.exe 83 PID 3156 wrote to memory of 2364 3156 regsvr32.exe 83 PID 3156 wrote to memory of 2364 3156 regsvr32.exe 83
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6b4b10e0f21a3f0ddb5dda5f6973a275.dll1⤵
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6b4b10e0f21a3f0ddb5dda5f6973a275.dll2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 101924⤵
- Program crash
PID:1644
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2364 -ip 23641⤵PID:1988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
203KB
MD5342d865e83df9b760c70dedb7c60167e
SHA112c0376bb867b4533b1ea8240dd5688067e5fac6
SHA256859554f496b469f14fb71e1e5b0b73e9e70f9f80fd3f16557003fa24cf87ea26
SHA5129e85bceee0e8d4b818096ab140510013032c3165aaabc808e9c28cf71182b2155b359c3256a52b14917b15418cd5eae2bb80b920ef18ff74f32df63e9d269a35