Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 09:14
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_78dd54266eb3d448247caf9e877364c5.dll
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_78dd54266eb3d448247caf9e877364c5.dll
-
Size
272KB
-
MD5
78dd54266eb3d448247caf9e877364c5
-
SHA1
2acdf9e27cf556996707dad6470c90b2895ce9f5
-
SHA256
df6444c4ab878a77bfd025f9a7c10d291d8d6908c7f8f440576b5a0c898c375a
-
SHA512
c1a6693fd9dd4725c6ffb3b8fc8e8bce5c912a9e4d95230c0a1b42d02d4b5fca0b89ae1e1a650c1d5403a8b551ab2a0eef981b307c158dc4504ee6f52bdefc90
-
SSDEEP
6144:k4y8gOB2NdmKbctyE4a8hTuviZqQvymZD+kDVku/mz:Zy8gTRiviZqQbh+kxHmz
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 4372 rundll32mgr.exe -
Loads dropped DLL 1 IoCs
pid Process 4372 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2864 4372 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4440 wrote to memory of 5116 4440 rundll32.exe 82 PID 4440 wrote to memory of 5116 4440 rundll32.exe 82 PID 4440 wrote to memory of 5116 4440 rundll32.exe 82 PID 5116 wrote to memory of 4372 5116 rundll32.exe 83 PID 5116 wrote to memory of 4372 5116 rundll32.exe 83 PID 5116 wrote to memory of 4372 5116 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_78dd54266eb3d448247caf9e877364c5.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_78dd54266eb3d448247caf9e877364c5.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4372 -s 3724⤵
- Program crash
PID:2864
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4372 -ip 43721⤵PID:1324
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
178KB
MD5db98a90a075816be151bf78a39293e5b
SHA18afc5325246accba5adcdd830aa4ff4b101e9983
SHA2560569be58ce08b5f17c84a3638327edf50aac1a2da68cee63c352f82545e61d66
SHA5120793d000ad8c151aa06df3e393fdf538faf93e70e479d5c2092ddebd6437a639db27fb8792669aa433a14f07e99b546fe1f36c1bb3a47b37127530bd5252451e