Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 23:24

General

  • Target

    17ecd2482ee7117bb01d500ed1dbc23f_JaffaCakes118.exe

  • Size

    88KB

  • MD5

    17ecd2482ee7117bb01d500ed1dbc23f

  • SHA1

    76507cec7f81a04ecba0a2542ed6c6f679a26a9f

  • SHA256

    86ab82676be16232b60514b0673f385e883af6f24a0ad43a98904c088d0292e6

  • SHA512

    f09497b9c0e3afd19979758e34407dff710b93c8dd5d4b3349441faad87ed610024c025c22a4424f93e67f9fef60a61d68728207cb9d86d92960187acd5df0bc

  • SSDEEP

    1536:KTS4t3A4HTqgpkY+0MMpqkRKihKs9q2+/u+shQ9sb4+wIyDYxBQuH6vd0J+yNCWj:KTU4GEkrMpJVLqW+sicgYb6vd0/G

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17ecd2482ee7117bb01d500ed1dbc23f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\17ecd2482ee7117bb01d500ed1dbc23f_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\dfxtide.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\dfxtide.dll",iep
        3⤵
        • Loads dropped DLL
        PID:4312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\dfxtide.dll

    Filesize

    88KB

    MD5

    ef100aef1f101e81cbae6f9cdcb58127

    SHA1

    548faa930db08b9bbe7665f8b3dab1f275803c2c

    SHA256

    98b0145d246bc2aa1c2134ae04d9d04a7bfc620fb5fd46276513a9d6945ecbf5

    SHA512

    bcc6f51def515971921cda11f9e8e7c8091c66e289a24b12f658927df9c5d5e60512433d7432ab7eb3cdaf7c98dec53fb652dfb13158c27c98edbe890036babe

  • memory/1592-11-0x0000000010000000-0x0000000010016000-memory.dmp

    Filesize

    88KB

  • memory/1592-15-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB

  • memory/1592-23-0x0000000010000000-0x0000000010016000-memory.dmp

    Filesize

    88KB

  • memory/1592-7-0x0000000010000000-0x0000000010016000-memory.dmp

    Filesize

    88KB

  • memory/1592-8-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB

  • memory/1592-9-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB

  • memory/1592-20-0x0000000010000000-0x0000000010016000-memory.dmp

    Filesize

    88KB

  • memory/1592-16-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB

  • memory/4312-22-0x0000000002770000-0x0000000002780000-memory.dmp

    Filesize

    64KB

  • memory/4312-21-0x0000000002770000-0x0000000002780000-memory.dmp

    Filesize

    64KB

  • memory/4312-24-0x0000000010000000-0x0000000010016000-memory.dmp

    Filesize

    88KB

  • memory/4312-28-0x0000000002770000-0x0000000002780000-memory.dmp

    Filesize

    64KB

  • memory/4312-27-0x0000000002770000-0x0000000002780000-memory.dmp

    Filesize

    64KB

  • memory/5068-1-0x0000000000B60000-0x0000000000B70000-memory.dmp

    Filesize

    64KB

  • memory/5068-14-0x0000000000B60000-0x0000000000B70000-memory.dmp

    Filesize

    64KB

  • memory/5068-0-0x0000000010000000-0x0000000010016000-memory.dmp

    Filesize

    88KB

  • memory/5068-10-0x0000000010000000-0x0000000010016000-memory.dmp

    Filesize

    88KB

  • memory/5068-2-0x0000000000B60000-0x0000000000B70000-memory.dmp

    Filesize

    64KB