Analysis
-
max time kernel
106s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 20:57
Static task
static1
General
-
Target
JaffaCakes118_b8e474b91289bf1cedbce42586ee24e5.dll
-
Size
412KB
-
MD5
b8e474b91289bf1cedbce42586ee24e5
-
SHA1
94d98e9a958bd76fee86f4c32324b10142bbe53b
-
SHA256
b4d0d4f8ab0d0c620f46480511dbff585065f1629400b44b9218dec3d8212201
-
SHA512
886ccdef7ae14bd207dbfe1b3f03241d330712a03274055df942038f4391648210c1400d20fa7bd038b7cdb48d88175540fb68e7e1cee6e6af62310154dac588
-
SSDEEP
6144:sayocjqchgZZWnvpIH0G6AE3ZoPw5WxOYd8r2RO4kF+RmHK9:sayocjqWgZZu+DE3ZXmLd5k43uk
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 6032 regsvr32mgr.exe -
Loads dropped DLL 1 IoCs
pid Process 6032 regsvr32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\regsvr32mgr.exe regsvr32.exe -
resource yara_rule behavioral1/memory/6032-5-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/6032-6-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 6140 6032 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 6064 wrote to memory of 5216 6064 regsvr32.exe 85 PID 6064 wrote to memory of 5216 6064 regsvr32.exe 85 PID 6064 wrote to memory of 5216 6064 regsvr32.exe 85 PID 5216 wrote to memory of 6032 5216 regsvr32.exe 87 PID 5216 wrote to memory of 6032 5216 regsvr32.exe 87 PID 5216 wrote to memory of 6032 5216 regsvr32.exe 87
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8e474b91289bf1cedbce42586ee24e5.dll1⤵
- Suspicious use of WriteProcessMemory
PID:6064 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8e474b91289bf1cedbce42586ee24e5.dll2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5216 -
C:\Windows\SysWOW64\regsvr32mgr.exeC:\Windows\SysWOW64\regsvr32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6032 -s 2764⤵
- Program crash
PID:6140
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 6032 -ip 60321⤵PID:3928
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
145KB
MD5236442845a1200d31dd50d7bc7a89960
SHA13a549937a35c4a9258bfcb1d99eee8cc975d22df
SHA256574e4f1332949f2af1a520d674dcec385152a19b008202a2de7b3957233cbb52
SHA512f212098e6fc5ccaca6b325b5830be7d2a4201ee087ed14165e2f686b1ca6e8b7e9719763f627e92d236575313d022ddfbd58b830cb9300b0e59f2fa6bfe68f18