Analysis

  • max time kernel
    140s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 14:18

General

  • Target

    0902e96924ea7673735b6cdc62184f3a_JaffaCakes118.exe

  • Size

    92KB

  • MD5

    0902e96924ea7673735b6cdc62184f3a

  • SHA1

    e88faea41ea241c71079dffa4bba7842c9bcf0b9

  • SHA256

    eb471b8c441a5be4e345081d255cba0ee7debe1271a627e9d3565a625f612735

  • SHA512

    e130c11966f1041fb26f3b67d623837adc20b03490e17be14ed87313a071bef77e1379be90c5cef8d2e327f72bdcf70da99971fa2abec8bbf13b48e1bb33bc4a

  • SSDEEP

    1536:CT2dAjHtBVI/E6HgW1g/vv4Z6xPD1K/tw/J1EoTEphDgF6qJ9MDEM4a:CT2ejHtBq/EAvi/vFxRMtwfx9Bf+

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0902e96924ea7673735b6cdc62184f3a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\0902e96924ea7673735b6cdc62184f3a_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4104
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\xlkecl.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3928
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\xlkecl.dll",iep
        3⤵
        • Loads dropped DLL
        PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\xlkecl.dll

    Filesize

    92KB

    MD5

    732b2604f83092f07b55589b19c83f9f

    SHA1

    b0a31434124622e6de37b1d8baa6ab4c39694213

    SHA256

    7373b7b25679d92c12ee4549b32c0fddca19b0a36a97c59aac2da049e8dee21d

    SHA512

    6bb0244eec06b1b73474e23c4339e817c67768b81ffc045a9b99f15b6f0d8101cd49b692f4295fc2999b89fe1870a439e02863c7cb0fbdfed4a39da0cb433288

  • memory/2536-23-0x0000000002380000-0x0000000002390000-memory.dmp

    Filesize

    64KB

  • memory/2536-28-0x0000000002380000-0x0000000002390000-memory.dmp

    Filesize

    64KB

  • memory/2536-29-0x0000000002380000-0x0000000002390000-memory.dmp

    Filesize

    64KB

  • memory/2536-25-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/2536-22-0x0000000002380000-0x0000000002390000-memory.dmp

    Filesize

    64KB

  • memory/3928-8-0x0000000002370000-0x0000000002380000-memory.dmp

    Filesize

    64KB

  • memory/3928-24-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/3928-11-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/3928-7-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/3928-21-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/3928-16-0x0000000002370000-0x0000000002380000-memory.dmp

    Filesize

    64KB

  • memory/3928-17-0x0000000002370000-0x0000000002380000-memory.dmp

    Filesize

    64KB

  • memory/3928-9-0x0000000002370000-0x0000000002380000-memory.dmp

    Filesize

    64KB

  • memory/4104-15-0x0000000002290000-0x00000000022A0000-memory.dmp

    Filesize

    64KB

  • memory/4104-0-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4104-10-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/4104-14-0x0000000002290000-0x00000000022A0000-memory.dmp

    Filesize

    64KB

  • memory/4104-1-0x0000000002290000-0x00000000022A0000-memory.dmp

    Filesize

    64KB

  • memory/4104-2-0x0000000002290000-0x00000000022A0000-memory.dmp

    Filesize

    64KB