Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 22:36

General

  • Target

    2972a8c81d2e7e56fb2990ec66239d30_JaffaCakes118.exe

  • Size

    570KB

  • MD5

    2972a8c81d2e7e56fb2990ec66239d30

  • SHA1

    33ace84f4ee379d52a1d4ee7812182e6be3d4cc0

  • SHA256

    fa09bec1b1f53920f441206f533e6cb4d791c52bd59e38bfe174f9db475f27b3

  • SHA512

    aa039af1570e415fb321f66308f1fa3b1e2681bfed91fa0d2455b531ed9278a2954822d0316f392e8316031e517f868a412809dfafce9fd3aed30a4fd74c7410

  • SSDEEP

    12288:C22vCw9Pe7yDKOQL5iCTD1F3Z4mxxSb8VyhLJ6PaztKTLzGdM:6CyPeUKOQFD1QmXiHD6CztKDp

Score
8/10

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2972a8c81d2e7e56fb2990ec66239d30_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\2972a8c81d2e7e56fb2990ec66239d30_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1912
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\2972a8c81d2e7e56fb2990ec66239d30_JaffaCakes118.exe"
      2⤵
        PID:1752
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k netsvcs
      1⤵
      • Loads dropped DLL
      PID:4884

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \??\c:\windows\SysWOW64\wrsysdata.dll

            Filesize

            242KB

            MD5

            19d36bca85e8a07f568c65fbf910e191

            SHA1

            77074afb2c3764b5bad2908fe40e23cef79582b3

            SHA256

            6096491346a5ca513369c8bf2e891c38711af91493987800acc8ac94e856e24f

            SHA512

            7a8c548be2873a66d96ba32a6343c2549652890db9a43cbc531739e72d8e7b3a6ba202eb16af651155395ee44a67bc9756851c7a232ddd189bb4146541be1cf5

          • memory/1912-6-0x0000000002310000-0x0000000002311000-memory.dmp

            Filesize

            4KB

          • memory/1912-4-0x00000000023A0000-0x00000000023A1000-memory.dmp

            Filesize

            4KB

          • memory/1912-5-0x0000000002320000-0x0000000002321000-memory.dmp

            Filesize

            4KB

          • memory/1912-0-0x0000000000400000-0x000000000049A000-memory.dmp

            Filesize

            616KB

          • memory/1912-11-0x0000000003420000-0x0000000003421000-memory.dmp

            Filesize

            4KB

          • memory/1912-10-0x0000000002330000-0x0000000002331000-memory.dmp

            Filesize

            4KB

          • memory/1912-9-0x00000000024C0000-0x00000000024C1000-memory.dmp

            Filesize

            4KB

          • memory/1912-7-0x0000000002390000-0x0000000002391000-memory.dmp

            Filesize

            4KB

          • memory/1912-3-0x0000000002340000-0x0000000002341000-memory.dmp

            Filesize

            4KB

          • memory/1912-8-0x0000000002380000-0x0000000002381000-memory.dmp

            Filesize

            4KB

          • memory/1912-12-0x0000000003410000-0x0000000003412000-memory.dmp

            Filesize

            8KB

          • memory/1912-2-0x0000000002360000-0x0000000002361000-memory.dmp

            Filesize

            4KB

          • memory/1912-1-0x0000000002260000-0x00000000022B4000-memory.dmp

            Filesize

            336KB

          • memory/1912-21-0x0000000000400000-0x000000000049A000-memory.dmp

            Filesize

            616KB

          • memory/1912-22-0x0000000002260000-0x00000000022B4000-memory.dmp

            Filesize

            336KB

          • memory/4884-19-0x0000000001B01000-0x0000000001B8C000-memory.dmp

            Filesize

            556KB

          • memory/4884-18-0x0000000001B00000-0x0000000001BC9000-memory.dmp

            Filesize

            804KB

          • memory/4884-23-0x0000000001B00000-0x0000000001BC9000-memory.dmp

            Filesize

            804KB

          • memory/4884-24-0x0000000001B01000-0x0000000001B8C000-memory.dmp

            Filesize

            556KB