Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/05/2024, 06:21

General

  • Target

    4ec61d2e0cb3204f6fc056c1dcab8e71_JaffaCakes118.exe

  • Size

    877KB

  • MD5

    4ec61d2e0cb3204f6fc056c1dcab8e71

  • SHA1

    33aaad56952ad21412a63540bf027960c18eedb3

  • SHA256

    2373795aaa68741e09588033137425ec7c778e772e5dd8b67363944d025ca535

  • SHA512

    fdebda6fd10f666ab91b21d8dd548fbb4207c942b34d095f54f6ccac561cb9f024174724cea8e9b61e2894a37266d273b7a14f75d751380cfb1e49f3d8c41fe0

  • SSDEEP

    24576:9CMLKmtvPyHu7JC7i0nzy9pNg4W7HM8ocN+2QHCmjp:wiKmHyOGp7s8VQF

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ec61d2e0cb3204f6fc056c1dcab8e71_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4ec61d2e0cb3204f6fc056c1dcab8e71_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4072
    • C:\Users\Admin\AppData\Local\Temp\4ec61d2e0cb3204f6fc056c1dcab8e71_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\4ec61d2e0cb3204f6fc056c1dcab8e71_JaffaCakes118.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3164
      • C:\Users\Admin\AppData\Local\Temp\4ec61d2e0cb3204f6fc056c1dcab8e71_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\4ec61d2e0cb3204f6fc056c1dcab8e71_JaffaCakes118.exe"
        3⤵
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:900

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\oJsylKLsIPcgMcJlq4r\extramod.dll

          Filesize

          73KB

          MD5

          88f0924cd615f6ad78b1ac2a0dd81a48

          SHA1

          607370be40a2da31d73bb97f731feb2d1d069621

          SHA256

          8329e39dcdafb7e2605ae7309c678d3abb9569aaa6ea7b9bb5608a676884cefd

          SHA512

          c13c01b8e52af4108ed96f7cf7b9957136bccc90b381dee29ce918195713e7fd4372e68aae05ba3e51e431bb5e40469a6aac7f9538aebf073c3ef344de6b40cf

        • C:\Users\Admin\AppData\Local\Temp\oJsylKLsIPcgMcJlq4r\loading_screen.dll

          Filesize

          5KB

          MD5

          44dac7f87bdf94d553f8d2cf073d605d

          SHA1

          21bf5d714b9fcab32ba40ff7d36e48c378b67a06

          SHA256

          0e7dedad1360a808e7ab1086ff1fffa7b72f09475c07a6991b74a6c6b78ccf66

          SHA512

          92c6bf81d514b3a07e7796843200a78c17969720776b03c0d347aeefedb8f1269f6aac642728a38544836c1f17c594d570718d11368dc91fe5194ee5e83e1774

        • C:\Users\Admin\AppData\Local\Temp\oJsylKLsIPcgMcJlq4r\lua51.dll

          Filesize

          494KB

          MD5

          f0c59526f8186eadaf2171b8fd2967c1

          SHA1

          8ffbe3e03d8139b50b41931c7b3360a0eebdb5cb

          SHA256

          6e35d85fe4365e508adc7faffc4517c29177380c2ba420f02c2b9ee03103d3f6

          SHA512

          dccd287c5f25cac346836e1140b743756178d01cd58539cf8fac12f7ae54d338bfb4364c650edb4d6018ef1f4065f7e9835d32fd608f8ae66c67a0ffd05e9854

        • C:\Users\Admin\AppData\Local\Temp\oJsylKLsIPcgMcJlq4r\shared_library.dll

          Filesize

          200KB

          MD5

          718a590dc0e947c8d74c660ca26d6a87

          SHA1

          58bbcf6ac5aa0155eb05356f77aa19c9e711c2ff

          SHA256

          ca708459446547849809a4591cfca24a0a03ecea0834f5642aa1a9ca4a078b76

          SHA512

          77ba5077bf2d80a6927eedde78df6d82e334bd0f3ce3da5a9e73ea1b49e1456fb2c53ae1e4ccdd24ccc89717842760a357ca7a804ac7374c72477551eee6bcd7

        • memory/900-20-0x000000007FE40000-0x000000007FE50000-memory.dmp

          Filesize

          64KB

        • memory/900-22-0x000000007FE30000-0x000000007FE40000-memory.dmp

          Filesize

          64KB

        • memory/900-21-0x000000007FE40000-0x000000007FE50000-memory.dmp

          Filesize

          64KB

        • memory/900-14-0x00000000023A0000-0x00000000023D6000-memory.dmp

          Filesize

          216KB

        • memory/900-19-0x000000007FE40000-0x000000007FE50000-memory.dmp

          Filesize

          64KB

        • memory/900-18-0x000000007FE40000-0x000000007FE50000-memory.dmp

          Filesize

          64KB

        • memory/900-17-0x000000007FE40000-0x000000007FE50000-memory.dmp

          Filesize

          64KB

        • memory/900-7-0x00000000006B0000-0x00000000006C6000-memory.dmp

          Filesize

          88KB

        • memory/900-28-0x000000007FE40000-0x000000007FE50000-memory.dmp

          Filesize

          64KB