Analysis
-
max time kernel
104s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2025, 03:28
Static task
static1
General
-
Target
JaffaCakes118_b945859384156f77ae5b54c9d5ad5b10.dll
-
Size
533KB
-
MD5
b945859384156f77ae5b54c9d5ad5b10
-
SHA1
a2359c1d0d3e0b506550de81a8eda077b7d7f9d8
-
SHA256
813d45c8d57ee598071f97ef1278b851fc3b8ed94442bebe62486c6d419a19c2
-
SHA512
6869ef0bcde179e3d4862b4b827d760fb74fdbedb4e897313fdfc9d59bd4c3647570ebdd4db95f4dfc3106305905a1fa383e9f2fb6aa578704c19957f1deac91
-
SSDEEP
12288:bh8fZLyb9PzVMBC/HVMOp4PkxHLCYwZckMQMN31W5t:b8F+Pzr/Hfp4MIYwZckMQmFq
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 1 IoCs
pid Process 3564 rundll32mgr.exe -
Loads dropped DLL 1 IoCs
pid Process 3564 rundll32mgr.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe -
resource yara_rule behavioral1/memory/3564-7-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Program crash 1 IoCs
pid pid_target Process procid_target 5596 3564 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 368 wrote to memory of 1720 368 rundll32.exe 86 PID 368 wrote to memory of 1720 368 rundll32.exe 86 PID 368 wrote to memory of 1720 368 rundll32.exe 86 PID 1720 wrote to memory of 3564 1720 rundll32.exe 88 PID 1720 wrote to memory of 3564 1720 rundll32.exe 88 PID 1720 wrote to memory of 3564 1720 rundll32.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b945859384156f77ae5b54c9d5ad5b10.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b945859384156f77ae5b54c9d5ad5b10.dll,#12⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 101764⤵
- Program crash
PID:5596
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3564 -ip 35641⤵PID:4212
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD54f3387277ccbd6d1f21ac5c07fe4ca68
SHA1e16506f662dc92023bf82def1d621497c8ab5890
SHA256767a3fc4a7a6818cdc3f0b99aaa95db694f6bcde719d2057a88b3d4df3d74fac
SHA5129da199ac69e3c0d4e0c6307e0ab8178f12cc25cb2f14c3511f6b64e6e60a925c860f3263cb38353a97b55a71ef4d27f8cb7fa3cfc08e7c1a349fd8d209dfa219
-
Filesize
98KB
MD5ea9c9b928f365368f2a022749319fa4c
SHA17e26b0f275f808cfb56aa02458565293e406b79e
SHA2563db586a1340f3075f360391e7b723dad93dfa273659e82cb696e63c13277697e
SHA5121cb7a84ae61cd340dd27eac44a1cfbbcf713c261c6315d1a46594f8492b3b203ef388b1d46f1e740ac7f012786d38670ec95e49aaaa7ae8cb26fe3d34569602c