Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 00:46

General

  • Target

    fe0853cbb59dd2671443bdb4d5e10899_JaffaCakes118.exe

  • Size

    120KB

  • MD5

    fe0853cbb59dd2671443bdb4d5e10899

  • SHA1

    c8de25e4fe5a1ee238ea814644388e03402f9357

  • SHA256

    cfc4f83ccd4f3b25487f89263c246b1d805d911bb3ec5b1d5a85d49475191682

  • SHA512

    93d5d113a4780d29c9c2c5e5f8f32233eff73ff8b8f30a26362a704ab2f4559e34d286ba383db32b22c78af306a6aed63b2a4824d3dccd0da639d2bed1e3b2b1

  • SSDEEP

    3072:3SHBPYkpyeZ4iA799O50NhSAOlRXJdg2t+0exaf6Rcg:3yBPYkoeZUZY54gxg2tFecS+

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe0853cbb59dd2671443bdb4d5e10899_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fe0853cbb59dd2671443bdb4d5e10899_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4208
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\cagcoxti.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4012
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\cagcoxti.dll",iep
        3⤵
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:4328

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\cagcoxti.dll

    Filesize

    120KB

    MD5

    ee82a345f0d2f2b9e2f420c3c8a497c1

    SHA1

    7bbc3d32f3df2a2c5388481b8a3fc2d7f4c9631a

    SHA256

    81bf96916e4e18732936a4ee616604b5a82373d67e9ffd6ebb307596ad680b30

    SHA512

    e6749e5d0d036c7e99919be69ea8743ea12f0868e86f608e1ed7a092cae336627c3625156851edf5ee469d21ed0d7c4596fd8a9585fcdbaf8eca779631b72189

  • memory/4012-16-0x0000000002410000-0x0000000002420000-memory.dmp

    Filesize

    64KB

  • memory/4012-25-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/4012-22-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/4012-7-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/4012-8-0x0000000002410000-0x0000000002420000-memory.dmp

    Filesize

    64KB

  • memory/4012-9-0x0000000002410000-0x0000000002420000-memory.dmp

    Filesize

    64KB

  • memory/4012-17-0x0000000002410000-0x0000000002420000-memory.dmp

    Filesize

    64KB

  • memory/4012-11-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/4208-15-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/4208-0-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/4208-14-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/4208-10-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/4208-1-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/4208-2-0x0000000002230000-0x0000000002240000-memory.dmp

    Filesize

    64KB

  • memory/4328-23-0x00000000020E0000-0x00000000020F0000-memory.dmp

    Filesize

    64KB

  • memory/4328-24-0x00000000020E0000-0x00000000020F0000-memory.dmp

    Filesize

    64KB

  • memory/4328-26-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/4328-29-0x00000000020E0000-0x00000000020F0000-memory.dmp

    Filesize

    64KB

  • memory/4328-30-0x00000000020E0000-0x00000000020F0000-memory.dmp

    Filesize

    64KB