Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2025 10:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6bf6b9971d471f26ead0ddb1338cec00.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_6bf6b9971d471f26ead0ddb1338cec00.dll
-
Size
434KB
-
MD5
6bf6b9971d471f26ead0ddb1338cec00
-
SHA1
cd639977df6a545e7f8441bf22bd7a77650cdb18
-
SHA256
1eb6fa51a9017304effc614382481601b25fc633cb198bc7b2cc7e5a5bc5e428
-
SHA512
d83c5ea16065a085ca2c94dc3c0ca0ac31a81b9b1c6a38da691fd92b82f3ff58e2645960c58d84867673f6d4d159ec7237aaea16a5a85076e038382301f2d25f
-
SSDEEP
12288:Rn2QK/lGRgOUqmq9kR6lhKXPqljtOBZh1/k7LDm6q8:Rn2QK/cRgOnmq9g6uqKLhlUo8
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 3 IoCs
pid Process 4788 rundll32mgr.exe 2840 hrl7A41.tmp 4392 ogiqci.exe -
Loads dropped DLL 2 IoCs
pid Process 4788 rundll32mgr.exe 4392 ogiqci.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\gei33.dll ogiqci.exe File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\ogiqci.exe hrl7A41.tmp File opened for modification C:\Windows\SysWOW64\ogiqci.exe hrl7A41.tmp -
resource yara_rule behavioral2/memory/4788-11-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4788-10-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4788-18-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4788-21-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4788-17-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4788-15-0x0000000000400000-0x000000000042A000-memory.dmp upx behavioral2/memory/4788-9-0x0000000000400000-0x000000000042A000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 908 4788 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrl7A41.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ogiqci.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 4788 rundll32mgr.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4612 wrote to memory of 3916 4612 rundll32.exe 83 PID 4612 wrote to memory of 3916 4612 rundll32.exe 83 PID 4612 wrote to memory of 3916 4612 rundll32.exe 83 PID 3916 wrote to memory of 4788 3916 rundll32.exe 84 PID 3916 wrote to memory of 4788 3916 rundll32.exe 84 PID 3916 wrote to memory of 4788 3916 rundll32.exe 84 PID 3916 wrote to memory of 2840 3916 rundll32.exe 85 PID 3916 wrote to memory of 2840 3916 rundll32.exe 85 PID 3916 wrote to memory of 2840 3916 rundll32.exe 85
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6bf6b9971d471f26ead0ddb1338cec00.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6bf6b9971d471f26ead0ddb1338cec00.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:4788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 3564⤵
- Program crash
PID:908
-
-
-
C:\Users\Admin\AppData\Local\Temp\hrl7A41.tmpC:\Users\Admin\AppData\Local\Temp\hrl7A41.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2840
-
-
-
C:\Windows\SysWOW64\ogiqci.exeC:\Windows\SysWOW64\ogiqci.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4788 -ip 47881⤵PID:1944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
338KB
MD59e5a94f2b4b378b2f50805cdd1efe405
SHA1e56fce2eedf674218165bdf53da7943f47875835
SHA2560a7ec6b90c8c4842f8348297b3cb61ec0ed4545e6f33a07089c9470ead25570b
SHA51221d8095183bfbc582a829af2c1f35c07ce2ebb120bece797f6e067f7c69c86beeaf7911f447d33540290504a8ad0318041743ee17ba2df3099b2729841a22827
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
9KB
MD5655d12e373b5891981111e48da1f0a88
SHA1db346a8879c226b2a6fb13300a8cccb089326b04
SHA2563eecef36be5dcb9c81ebbbd2eb0bdcd456d81592673fae46f043d5423b8d7748
SHA5120a27696905df67638e43ae479e376f89657475675711c9d1b292da629520cc36dfafca12232308b232a7ccc3e9e47b39baf1b9d0b597c8d1c6946aa827aaeeea
-
Filesize
84KB
MD5a6ee7aab6b8f8268bf9eb763949d5c8b
SHA14600e17eb8fa4a11170aaa2c54d98126e58290e0
SHA2569030a2ec813b5a70b898aacd81378c941bc5f62e78cc1a958f93106ede81228c
SHA51200569ed578d3f0b535b0c17dc131131e4aaf73b8b5235c70fcf8de649e8a942f48a013e8c687c6abab05a8f7516dabed41309da6ce7c9eb26992183e4794afb8