Analysis

  • max time kernel
    105s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/04/2025, 19:22

General

  • Target

    JaffaCakes118_b8c0cce64b64b00bb6805dbf83b5f470.dll

  • Size

    484KB

  • MD5

    b8c0cce64b64b00bb6805dbf83b5f470

  • SHA1

    b0a5f375eb6d797436820c715e7754f19862b3c3

  • SHA256

    4e3ab308d832e8b6a96448e3e09feaf7bbac4e5f8a58de7493f874eb660a69b7

  • SHA512

    d45a2b061a827ee0f295019238ec264472158bb42af574247966dbbde549cfc6748a794706ec7279fb3968c5af5f3e01a511cbc32cdcdfe5fd5ffee56c7eb666

  • SSDEEP

    3072:u4aWY9nTGKTNX91X1cM3Sm+3HDktMBuSdfIQWyONwEUQ3z9DUnCUlKK3XF7PJ1Xb:ahUuIMSmgktMB9lKhUcUnZgu17nXKEKY

Malware Config

Signatures

  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 6 IoCs
  • Drops file in System32 directory 2 IoCs
  • UPX packed file 16 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 10 IoCs
  • Program crash 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Modifies registry class 60 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of UnmapMainImage 6 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8c0cce64b64b00bb6805dbf83b5f470.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4704
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8c0cce64b64b00bb6805dbf83b5f470.dll
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Windows\SysWOW64\regsvr32mgr.exe
        C:\Windows\SysWOW64\regsvr32mgr.exe
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2384
        • C:\Windows\SysWOW64\regsvr32mgrmgr.exe
          C:\Windows\SysWOW64\regsvr32mgrmgr.exe
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of UnmapMainImage
          • Suspicious use of WriteProcessMemory
          PID:4124
          • C:\Program Files (x86)\Microsoft\WaterMark.exe
            "C:\Program Files (x86)\Microsoft\WaterMark.exe"
            5⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of UnmapMainImage
            • Suspicious use of WriteProcessMemory
            PID:3208
            • C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe
              "C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"
              6⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:904
              • C:\Program Files (x86)\Microsoft\WaterMark.exe
                "C:\Program Files (x86)\Microsoft\WaterMark.exe"
                7⤵
                • Executes dropped EXE
                • Drops file in Program Files directory
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of UnmapMainImage
                • Suspicious use of WriteProcessMemory
                PID:2280
                • C:\Windows\SysWOW64\svchost.exe
                  C:\Windows\system32\svchost.exe
                  8⤵
                    PID:596
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 596 -s 204
                      9⤵
                      • Program crash
                      PID:2688
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe"
                    8⤵
                    • Modifies Internet Explorer settings
                    PID:4328
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe"
                    8⤵
                    • Modifies Internet Explorer settings
                    PID:2700
              • C:\Windows\SysWOW64\svchost.exe
                C:\Windows\system32\svchost.exe
                6⤵
                  PID:4464
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 204
                    7⤵
                    • Program crash
                    PID:264
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  6⤵
                  • Modifies Internet Explorer settings
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:5020
                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5020 CREDAT:17410 /prefetch:2
                    7⤵
                    • System Location Discovery: System Language Discovery
                    • Modifies Internet Explorer settings
                    • Suspicious use of SetWindowsHookEx
                    PID:4924
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  6⤵
                  • Modifies Internet Explorer settings
                  PID:4152
            • C:\Program Files (x86)\Microsoft\WaterMark.exe
              "C:\Program Files (x86)\Microsoft\WaterMark.exe"
              4⤵
              • Executes dropped EXE
              • Drops file in Program Files directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of UnmapMainImage
              • Suspicious use of WriteProcessMemory
              PID:2236
              • C:\Windows\SysWOW64\svchost.exe
                C:\Windows\system32\svchost.exe
                5⤵
                  PID:644
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 644 -s 204
                    6⤵
                    • Program crash
                    PID:2588
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  5⤵
                  • Modifies Internet Explorer settings
                  PID:5108
                • C:\Program Files\Internet Explorer\iexplore.exe
                  "C:\Program Files\Internet Explorer\iexplore.exe"
                  5⤵
                  • Modifies Internet Explorer settings
                  PID:1132
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 644 -ip 644
          1⤵
            PID:4356
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 596 -ip 596
            1⤵
              PID:3472
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4464 -ip 4464
              1⤵
                PID:2252

              Network

              MITRE ATT&CK Enterprise v16

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe

                Filesize

                164KB

                MD5

                1e7fd6957860e5272c6b6866b8775940

                SHA1

                baa96e2375f1ed39d9848f78442d2ab4cc5feb59

                SHA256

                538641e6c912e4a3693c65bd4d7c188c4d2819e9e4049866369506b705cbbafc

                SHA512

                4f9906af00f9de914f263fbbbba94f587a0067a9b2b847cac2cd3a4e9a4ee54804e0c329a702b86653ac0fa22c21e7d6fa44fff30ff8f3ee3d792502838c05f3

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187

                Filesize

                471B

                MD5

                d9e0b437587fc16df735e81bd8664814

                SHA1

                378e1ddfe081e992f77f85a51fcc607f7f0c60e4

                SHA256

                71fd77be59db04b79ee56549a4016b972c2b37ffdae785d1eb57279bcff4319b

                SHA512

                8f64e3065ecbcafb29c68f1804a63cb7e477d8901771a2a283baf041eba3bc4b3ebc2ea8aa5073b22d82388889bfe7912870802c69996c1d13083ea3c8da2c75

              • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187

                Filesize

                412B

                MD5

                92a39566ffe3250f762d4728f7f8e875

                SHA1

                5ad73bcbd414d970707daf30107bc77d3be0cdd9

                SHA256

                52ee4d8c4bb0a35922e525d510e58d17fc7114a365541d4f50dd37f4a005b702

                SHA512

                6010f67bba3daa079d8df1dec089af3d1641602ecde366044cae5463dcdf715acdacb094ee89344ed6da59c3d02f93a0ff88e60b0e011444c7560da497b26b68

              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\EAO45EME\suggestions[1].en-US

                Filesize

                17KB

                MD5

                5a34cb996293fde2cb7a4ac89587393a

                SHA1

                3c96c993500690d1a77873cd62bc639b3a10653f

                SHA256

                c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                SHA512

                e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

              • C:\Windows\SysWOW64\regsvr32mgr.exe

                Filesize

                331KB

                MD5

                db591b83cf5e261078afcfca484417c3

                SHA1

                1115663be4e5d4e98a76254d4bce2ae8b0b771f2

                SHA256

                7a0d389157998f975ddc44be2d440264d861ba0bb4a6b7f605383e7035a77806

                SHA512

                6f462b6484f044f73b90dbf6b34547a25ceabc050f25b2f38a1400bd2d7fbc2f6591019ce6e3708d3b6ce44b5805900f50f4812acd5dc1536b955baafdcafa1e

              • memory/904-71-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/2236-43-0x0000000000400000-0x0000000000470000-memory.dmp

                Filesize

                448KB

              • memory/2236-85-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/2236-89-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/2236-87-0x0000000002970000-0x0000000002971000-memory.dmp

                Filesize

                4KB

              • memory/2236-70-0x00000000008C0000-0x00000000008C1000-memory.dmp

                Filesize

                4KB

              • memory/2280-88-0x0000000000070000-0x0000000000071000-memory.dmp

                Filesize

                4KB

              • memory/2280-82-0x0000000000400000-0x0000000000470000-memory.dmp

                Filesize

                448KB

              • memory/2280-81-0x00000000028A0000-0x00000000028A1000-memory.dmp

                Filesize

                4KB

              • memory/2384-21-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/2384-11-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/2384-6-0x0000000000400000-0x0000000000470000-memory.dmp

                Filesize

                448KB

              • memory/2384-19-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/2384-13-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/2384-28-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/2384-22-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/2384-20-0x0000000002880000-0x0000000002881000-memory.dmp

                Filesize

                4KB

              • memory/2384-12-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/2556-1-0x000000005B4A0000-0x000000005B51C000-memory.dmp

                Filesize

                496KB

              • memory/3208-90-0x00000000778A2000-0x00000000778A3000-memory.dmp

                Filesize

                4KB

              • memory/3208-86-0x0000000002A70000-0x0000000002A71000-memory.dmp

                Filesize

                4KB

              • memory/3208-78-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3208-44-0x0000000000400000-0x0000000000470000-memory.dmp

                Filesize

                448KB

              • memory/3208-57-0x00000000009B0000-0x00000000009B1000-memory.dmp

                Filesize

                4KB

              • memory/3208-91-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3208-54-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/3208-59-0x00000000778A2000-0x00000000778A3000-memory.dmp

                Filesize

                4KB

              • memory/4124-9-0x0000000000400000-0x0000000000446000-memory.dmp

                Filesize

                280KB

              • memory/4124-29-0x0000000000400000-0x0000000000421000-memory.dmp

                Filesize

                132KB

              • memory/4464-66-0x00000000004A0000-0x00000000004A1000-memory.dmp

                Filesize

                4KB

              • memory/4464-65-0x00000000004C0000-0x00000000004C1000-memory.dmp

                Filesize

                4KB