Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03/01/2025, 16:24
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6de934aad6628ea7c91d5373ece05bf0.dll
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_6de934aad6628ea7c91d5373ece05bf0.dll
-
Size
220KB
-
MD5
6de934aad6628ea7c91d5373ece05bf0
-
SHA1
21baf31a6ff4f79e2f2d700d8763dd1b636615f5
-
SHA256
d07549e8725e71353a99ac2ac9f0bddde94bbadc33af72999adaba5a11804d4c
-
SHA512
e04d807885418e1c2bce6561713ea5d2cff08b3d7389a87d010f80f18f2396693ae7ca57f845ea0b52793d07ba51e0077f8318f84c9ae23697a5b446d639b5f0
-
SSDEEP
3072:VARLoeA9vRWlt0ls+kenQgKVMmDaWoOCBbI2JSeM3jiMyYyBmbr:ELqk1tJVjDfaBE2JSeMTiMMYbr
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 2328 rundll32mgr.exe -
Loads dropped DLL 2 IoCs
pid Process 348 rundll32.exe 348 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral1/files/0x00080000000120fd-0.dat upx behavioral1/memory/2328-10-0x0000000000400000-0x0000000000462000-memory.dmp upx behavioral1/memory/2328-15-0x0000000000400000-0x0000000000462000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe -
Suspicious behavior: MapViewOfSection 25 IoCs
pid Process 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe 2328 rundll32mgr.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2328 rundll32mgr.exe Token: SeDebugPrivilege 2328 rundll32mgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 844 wrote to memory of 348 844 rundll32.exe 29 PID 844 wrote to memory of 348 844 rundll32.exe 29 PID 844 wrote to memory of 348 844 rundll32.exe 29 PID 844 wrote to memory of 348 844 rundll32.exe 29 PID 844 wrote to memory of 348 844 rundll32.exe 29 PID 844 wrote to memory of 348 844 rundll32.exe 29 PID 844 wrote to memory of 348 844 rundll32.exe 29 PID 348 wrote to memory of 2328 348 rundll32.exe 30 PID 348 wrote to memory of 2328 348 rundll32.exe 30 PID 348 wrote to memory of 2328 348 rundll32.exe 30 PID 348 wrote to memory of 2328 348 rundll32.exe 30 PID 2328 wrote to memory of 384 2328 rundll32mgr.exe 3 PID 2328 wrote to memory of 384 2328 rundll32mgr.exe 3 PID 2328 wrote to memory of 384 2328 rundll32mgr.exe 3 PID 2328 wrote to memory of 384 2328 rundll32mgr.exe 3 PID 2328 wrote to memory of 384 2328 rundll32mgr.exe 3 PID 2328 wrote to memory of 384 2328 rundll32mgr.exe 3 PID 2328 wrote to memory of 384 2328 rundll32mgr.exe 3 PID 2328 wrote to memory of 392 2328 rundll32mgr.exe 4 PID 2328 wrote to memory of 392 2328 rundll32mgr.exe 4 PID 2328 wrote to memory of 392 2328 rundll32mgr.exe 4 PID 2328 wrote to memory of 392 2328 rundll32mgr.exe 4 PID 2328 wrote to memory of 392 2328 rundll32mgr.exe 4 PID 2328 wrote to memory of 392 2328 rundll32mgr.exe 4 PID 2328 wrote to memory of 392 2328 rundll32mgr.exe 4 PID 2328 wrote to memory of 432 2328 rundll32mgr.exe 5 PID 2328 wrote to memory of 432 2328 rundll32mgr.exe 5 PID 2328 wrote to memory of 432 2328 rundll32mgr.exe 5 PID 2328 wrote to memory of 432 2328 rundll32mgr.exe 5 PID 2328 wrote to memory of 432 2328 rundll32mgr.exe 5 PID 2328 wrote to memory of 432 2328 rundll32mgr.exe 5 PID 2328 wrote to memory of 432 2328 rundll32mgr.exe 5 PID 2328 wrote to memory of 480 2328 rundll32mgr.exe 6 PID 2328 wrote to memory of 480 2328 rundll32mgr.exe 6 PID 2328 wrote to memory of 480 2328 rundll32mgr.exe 6 PID 2328 wrote to memory of 480 2328 rundll32mgr.exe 6 PID 2328 wrote to memory of 480 2328 rundll32mgr.exe 6 PID 2328 wrote to memory of 480 2328 rundll32mgr.exe 6 PID 2328 wrote to memory of 480 2328 rundll32mgr.exe 6 PID 2328 wrote to memory of 488 2328 rundll32mgr.exe 7 PID 2328 wrote to memory of 488 2328 rundll32mgr.exe 7 PID 2328 wrote to memory of 488 2328 rundll32mgr.exe 7 PID 2328 wrote to memory of 488 2328 rundll32mgr.exe 7 PID 2328 wrote to memory of 488 2328 rundll32mgr.exe 7 PID 2328 wrote to memory of 488 2328 rundll32mgr.exe 7 PID 2328 wrote to memory of 488 2328 rundll32mgr.exe 7 PID 2328 wrote to memory of 496 2328 rundll32mgr.exe 8 PID 2328 wrote to memory of 496 2328 rundll32mgr.exe 8 PID 2328 wrote to memory of 496 2328 rundll32mgr.exe 8 PID 2328 wrote to memory of 496 2328 rundll32mgr.exe 8 PID 2328 wrote to memory of 496 2328 rundll32mgr.exe 8 PID 2328 wrote to memory of 496 2328 rundll32mgr.exe 8 PID 2328 wrote to memory of 496 2328 rundll32mgr.exe 8 PID 2328 wrote to memory of 588 2328 rundll32mgr.exe 9 PID 2328 wrote to memory of 588 2328 rundll32mgr.exe 9 PID 2328 wrote to memory of 588 2328 rundll32mgr.exe 9 PID 2328 wrote to memory of 588 2328 rundll32mgr.exe 9 PID 2328 wrote to memory of 588 2328 rundll32mgr.exe 9 PID 2328 wrote to memory of 588 2328 rundll32mgr.exe 9 PID 2328 wrote to memory of 588 2328 rundll32mgr.exe 9 PID 2328 wrote to memory of 668 2328 rundll32mgr.exe 10 PID 2328 wrote to memory of 668 2328 rundll32mgr.exe 10 PID 2328 wrote to memory of 668 2328 rundll32mgr.exe 10 PID 2328 wrote to memory of 668 2328 rundll32mgr.exe 10
Processes
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:384
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:588
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:1608
-
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1728
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:668
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:748
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:804
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1360
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:832
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:944
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:1008
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:736
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:984
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1296
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:1720
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:1348
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:1976
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:488
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:496
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:392
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:432
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1396
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6de934aad6628ea7c91d5373ece05bf0.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6de934aad6628ea7c91d5373ece05bf0.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2328
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD59bc93b78dd472a333bc3608ac69260b7
SHA13c2b55426c6c53d1075641f602a370fcb9246ced
SHA2569a33e58ed2b6b6667f12cc23eef8970676b96afc9ce026503c4d39143b6a1db7
SHA51270f2b6782fed3ebf1f4001c04855ea5fe762343b75c6a1781016217829b4ff414557acfd2278474e5346105e1f3e43d99f83a5d4aa36c20bb9742f2776575240