Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11-04-2024 09:33
Static task
static1
Behavioral task
behavioral1
Sample
ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe
-
Size
92KB
-
MD5
ed1c150417809fc543d9c76a0c188c10
-
SHA1
e344c479f5048d2097e21bf20508daea10dc4d0c
-
SHA256
bcb17afbe86af3cecca26895528cddccd84db5f84e81f45bdcc54de8cbeb8eb7
-
SHA512
9d6630805b592af1fc5069faad82b3015f35b86a14b3efe913ee6cb21ca8d395bfaf6e5dd372a83990862920b65175c14e7aef86933e618c6d05ca3249852013
-
SSDEEP
1536:Q83e9btz0DRwG7m+0XOPffculrRFXDgShVQ9MX9CwAHhcm+kZm+p:DWpz0DyGajOTlrRGi90/m+p
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 4556 rundll32.exe 5024 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ihujapupiyecife = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Mgic10ur.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 4556 rundll32.exe 4556 rundll32.exe 4556 rundll32.exe 4556 rundll32.exe 4556 rundll32.exe 4556 rundll32.exe 4556 rundll32.exe 4556 rundll32.exe 4556 rundll32.exe 4556 rundll32.exe 4556 rundll32.exe 4556 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4968 wrote to memory of 4556 4968 ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe 84 PID 4968 wrote to memory of 4556 4968 ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe 84 PID 4968 wrote to memory of 4556 4968 ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe 84 PID 4556 wrote to memory of 5024 4556 rundll32.exe 93 PID 4556 wrote to memory of 5024 4556 rundll32.exe 93 PID 4556 wrote to memory of 5024 4556 rundll32.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed1c150417809fc543d9c76a0c188c10_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Mgic10ur.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Mgic10ur.dll",iep3⤵
- Loads dropped DLL
PID:5024
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5c9036c5b09ca3dd0571fb5a3beef8345
SHA18f124031a90c035b3733d4aafb67ca52386b4ce3
SHA256d6558c1fff3c2499c70e5e9a9ea34370f0f04b502f1ea52e31690daa68b70c97
SHA512ba129328b7aa3867f70ab73b124b5a992db99b362a5862c47995300fedf3b910f05484b2645b954cb3acd8fc626d8008ac21efb7db607833c73f00fc841775ab