Analysis
-
max time kernel
105s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2025, 12:50
Static task
static1
General
-
Target
JaffaCakes118_b24c7398af0e444a4081e455d80a6651.dll
-
Size
234KB
-
MD5
b24c7398af0e444a4081e455d80a6651
-
SHA1
10506c5e669ac33e57ff5806b7d98648479dad07
-
SHA256
d57d4ffe738d908dfb69694bb0dcde9a78519ed86494c8f002835673ce1d2906
-
SHA512
e0bcf67828421804f0072fa6c635eb1458f77e2010ba1e6684da6cc4b92c89b1753051e6c59603d50036aef5f300d6e6f49ed9f571a37b387435f22e9b5c6c8f
-
SSDEEP
6144:QqK86JU5xhG+npxA1oGzDK/0OlEa6ETMhS5yfZahy4yYAVt/GS:FK86JmG+YzDKMAEa6SMw/hypYA//GS
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 2 IoCs
pid Process 5272 rundll32mgr.exe 4128 rundll32mgr.exe -
Loads dropped DLL 1 IoCs
pid Process 4128 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5272 set thread context of 4128 5272 rundll32mgr.exe 89 -
resource yara_rule behavioral1/memory/4128-9-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/4128-13-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/4128-12-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/4128-14-0x0000000000400000-0x0000000000463000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 4964 4128 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5272 rundll32mgr.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 5220 wrote to memory of 2208 5220 rundll32.exe 84 PID 5220 wrote to memory of 2208 5220 rundll32.exe 84 PID 5220 wrote to memory of 2208 5220 rundll32.exe 84 PID 2208 wrote to memory of 5272 2208 rundll32.exe 85 PID 2208 wrote to memory of 5272 2208 rundll32.exe 85 PID 2208 wrote to memory of 5272 2208 rundll32.exe 85 PID 5272 wrote to memory of 4128 5272 rundll32mgr.exe 89 PID 5272 wrote to memory of 4128 5272 rundll32mgr.exe 89 PID 5272 wrote to memory of 4128 5272 rundll32mgr.exe 89 PID 5272 wrote to memory of 4128 5272 rundll32mgr.exe 89 PID 5272 wrote to memory of 4128 5272 rundll32mgr.exe 89 PID 5272 wrote to memory of 4128 5272 rundll32mgr.exe 89 PID 5272 wrote to memory of 4128 5272 rundll32mgr.exe 89 PID 5272 wrote to memory of 4128 5272 rundll32mgr.exe 89
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b24c7398af0e444a4081e455d80a6651.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b24c7398af0e444a4081e455d80a6651.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5272 -
C:\Windows\SysWOW64\rundll32mgr.exe"C:\Windows\SysWOW64\rundll32mgr.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4128 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4128 -s 2965⤵
- Program crash
PID:4964
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4128 -ip 41281⤵PID:4704
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
169KB
MD59ab7e251afa8bfa4c390573239ba892b
SHA1b0a4219bdfb689a7be1c2500a80a2e8a3eb128fa
SHA25617b354d9e702155a8e58e15ba7cf978a7b9391e609800b33462d2e79bb5b67f4
SHA5127e714234d08472d7c29cf12971f00371296044978020608f7ee0b988d0c7fedffe502c3f92abb3d09dedec42a821b756d004693dad02cde7f8566f964679cd22