Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/04/2024, 00:58

General

  • Target

    f92674327627e2db37cf2a8a76893fe9_JaffaCakes118.exe

  • Size

    124KB

  • MD5

    f92674327627e2db37cf2a8a76893fe9

  • SHA1

    265846e8590ccce4343ce2344dc9787a984486e4

  • SHA256

    722ab480efda8ae8f4fd63188013891636d276dd2b982642e1d921ece76e0d83

  • SHA512

    3ce966b24932ab749b766aea4135cee50fdb2cbe3b89d7756896e44037b4c4986c0cf5ffd6c62cf6401bcfdbfbfa4fb549234dfa720fcc6ec3f32f410f9a2825

  • SSDEEP

    3072:SyU79DqxobR/4lbSvxD09c8xzJDS6gwtOlRXJdg5pjuEE/:piLbR/452x0c8xc8Ig5E

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f92674327627e2db37cf2a8a76893fe9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f92674327627e2db37cf2a8a76893fe9_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4216
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\AdmUIUsb.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\AdmUIUsb.dll",iep
        3⤵
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\AdmUIUsb.dll

    Filesize

    124KB

    MD5

    f3c83e89feb6cffcf5aa3023cec1f70a

    SHA1

    d12f689a27f4c142fe7dee423fc07e4cb91393a9

    SHA256

    d6b05a408fa908d6f50eda7f68827cae0c6b8eb591e89adab1dd387d8b6300ca

    SHA512

    9ee1aee26672ddc9300aa0df681e3cb34d01f08dc088522a1d11cc77946092e9c42b6b6668272d904ff63494243ed26a04cc61b73ee5552da55ded6910e7ccdd

  • memory/920-10-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/920-22-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/920-19-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/920-7-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/920-8-0x0000000002EF0000-0x0000000002F00000-memory.dmp

    Filesize

    64KB

  • memory/920-15-0x0000000002EF0000-0x0000000002F00000-memory.dmp

    Filesize

    64KB

  • memory/2248-20-0x0000000002DF0000-0x0000000002E00000-memory.dmp

    Filesize

    64KB

  • memory/2248-21-0x0000000002DF0000-0x0000000002E00000-memory.dmp

    Filesize

    64KB

  • memory/2248-23-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/2248-26-0x0000000002DF0000-0x0000000002E00000-memory.dmp

    Filesize

    64KB

  • memory/2248-27-0x0000000002DF0000-0x0000000002E00000-memory.dmp

    Filesize

    64KB

  • memory/4216-13-0x0000000002530000-0x0000000002540000-memory.dmp

    Filesize

    64KB

  • memory/4216-14-0x0000000002530000-0x0000000002540000-memory.dmp

    Filesize

    64KB

  • memory/4216-9-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/4216-2-0x0000000002530000-0x0000000002540000-memory.dmp

    Filesize

    64KB

  • memory/4216-0-0x0000000010000000-0x000000001001F000-memory.dmp

    Filesize

    124KB

  • memory/4216-1-0x0000000002530000-0x0000000002540000-memory.dmp

    Filesize

    64KB