Analysis

  • max time kernel
    140s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 05:31

General

  • Target

    213c6db9db5a06b42d110987d77d1111_JaffaCakes118.exe

  • Size

    92KB

  • MD5

    213c6db9db5a06b42d110987d77d1111

  • SHA1

    c586fdc3bd8cab794517c82e018a55ecaece742d

  • SHA256

    c9c42fa50740ee487ffe89ea887ac68cb214d77f635dca749e161e99d4b1bda4

  • SHA512

    35663c639068a543e553976267d2737a62b20297ffe3d5f2ef315658429aab8d13030a25da68dff3ae2b891f4935c9b49a8dabe29394376b664c530c1aa5a64c

  • SSDEEP

    1536:jWv+i3J2OUhdb7b966LljCt+pHmdUm3omWbB6lfwyTiyIMR:jW2i52Oc5b966RjCttdUm3omW8hTdl

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\213c6db9db5a06b42d110987d77d1111_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\213c6db9db5a06b42d110987d77d1111_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3192
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\phFromfg.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:636
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\phFromfg.dll",iep
        3⤵
        • Loads dropped DLL
        PID:948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\phFromfg.dll

    Filesize

    92KB

    MD5

    43c774f49339c0f8a48d95b8613463fa

    SHA1

    6c5395823d27d4c22d77773287cbf35e60ab466a

    SHA256

    99a85df5ad4031665f92d89ed0bb3970ad16547e68934083cc8f7adccbd9fd4d

    SHA512

    0339979e37ad101352e28e8769457cb702f0629de1e5869c5da10ed0a51fd8bf3e04d1d7aca42b30e9b733050708ed8f1e1dcf49f95f0ad1bf325af90772587c

  • memory/636-21-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/636-16-0x0000000002C10000-0x0000000002C20000-memory.dmp

    Filesize

    64KB

  • memory/636-24-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/636-17-0x0000000002C10000-0x0000000002C20000-memory.dmp

    Filesize

    64KB

  • memory/636-9-0x0000000002C10000-0x0000000002C20000-memory.dmp

    Filesize

    64KB

  • memory/636-8-0x0000000002C10000-0x0000000002C20000-memory.dmp

    Filesize

    64KB

  • memory/636-7-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/636-11-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/948-23-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/948-22-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/948-25-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/948-29-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/948-28-0x00000000015A0000-0x00000000015B0000-memory.dmp

    Filesize

    64KB

  • memory/3192-2-0x0000000002360000-0x0000000002370000-memory.dmp

    Filesize

    64KB

  • memory/3192-14-0x0000000002360000-0x0000000002370000-memory.dmp

    Filesize

    64KB

  • memory/3192-10-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/3192-15-0x0000000002360000-0x0000000002370000-memory.dmp

    Filesize

    64KB

  • memory/3192-0-0x0000000010000000-0x0000000010017000-memory.dmp

    Filesize

    92KB

  • memory/3192-1-0x0000000002360000-0x0000000002370000-memory.dmp

    Filesize

    64KB