Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-04-2024 09:33

General

  • Target

    ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe

  • Size

    92KB

  • MD5

    ed1c150417809fc543d9c76a0c188c10

  • SHA1

    e344c479f5048d2097e21bf20508daea10dc4d0c

  • SHA256

    bcb17afbe86af3cecca26895528cddccd84db5f84e81f45bdcc54de8cbeb8eb7

  • SHA512

    9d6630805b592af1fc5069faad82b3015f35b86a14b3efe913ee6cb21ca8d395bfaf6e5dd372a83990862920b65175c14e7aef86933e618c6d05ca3249852013

  • SSDEEP

    1536:Q83e9btz0DRwG7m+0XOPffculrRFXDgShVQ9MX9CwAHhcm+kZm+p:DWpz0DyGajOTlrRGi90/m+p

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Mgic10ur.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4556
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\Mgic10ur.dll",iep
        3⤵
        • Loads dropped DLL
        PID:5024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Mgic10ur.dll

    Filesize

    92KB

    MD5

    c9036c5b09ca3dd0571fb5a3beef8345

    SHA1

    8f124031a90c035b3733d4aafb67ca52386b4ce3

    SHA256

    d6558c1fff3c2499c70e5e9a9ea34370f0f04b502f1ea52e31690daa68b70c97

    SHA512

    ba129328b7aa3867f70ab73b124b5a992db99b362a5862c47995300fedf3b910f05484b2645b954cb3acd8fc626d8008ac21efb7db607833c73f00fc841775ab

  • memory/4556-11-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4556-21-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4556-24-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4556-16-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/4556-8-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4556-9-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/4556-17-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/4556-7-0x0000000002AA0000-0x0000000002AB0000-memory.dmp

    Filesize

    64KB

  • memory/4968-1-0x00000000022D0000-0x00000000022E0000-memory.dmp

    Filesize

    64KB

  • memory/4968-0-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4968-10-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4968-2-0x00000000022D0000-0x00000000022E0000-memory.dmp

    Filesize

    64KB

  • memory/4968-15-0x00000000022D0000-0x00000000022E0000-memory.dmp

    Filesize

    64KB

  • memory/4968-14-0x00000000022D0000-0x00000000022E0000-memory.dmp

    Filesize

    64KB

  • memory/5024-28-0x0000000000EA0000-0x0000000000EB0000-memory.dmp

    Filesize

    64KB

  • memory/5024-22-0x0000000000EA0000-0x0000000000EB0000-memory.dmp

    Filesize

    64KB

  • memory/5024-23-0x0000000000EA0000-0x0000000000EB0000-memory.dmp

    Filesize

    64KB

  • memory/5024-25-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB