Analysis

  • max time kernel
    140s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-07-2024 18:43

General

  • Target

    3188344854588c001b9fb1801cd02cf5_JaffaCakes118.exe

  • Size

    40KB

  • MD5

    3188344854588c001b9fb1801cd02cf5

  • SHA1

    fca48d90b1ad49e2369301dc56073820658bf5d5

  • SHA256

    5bf54fffc947fc74089d9db59dba47fe3c6f54915e7aaf224deeb7d96e2fbfce

  • SHA512

    f1b0c6130cae86b33de66acd0b312b52ec56eb4b7ad1c103e9fd953fe453ddd0d72f81bcb6f0393005aa4b6a1f67ae2cec59fb4f9b0fd983449942e80c414cd9

  • SSDEEP

    768:F2T4jwgTOl/tFr60FIgbrcAztf9Jrd0NV+RQmgQ0N2UxZuf:IT40UOlzr7lMAztf7QmgQAyf

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3188344854588c001b9fb1801cd02cf5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\3188344854588c001b9fb1801cd02cf5_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 "C:\Windows\Gsafecahalevetec.dll",e
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      PID:1048

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Gsafecahalevetec.dll

    Filesize

    40KB

    MD5

    337eea684ddef97cc944500c81fbeece

    SHA1

    52bf627adbbc3d27095c108e7ea2e0e60c7ecb2b

    SHA256

    7ddee08a62b0782ddcf0ae83c7602b4c1f60e2b2c7e7e2da5ae9e4250f96ef3e

    SHA512

    c25955d030d37be4f2ec0632dc8525fd2bd9dde1f694494a6616623d669164fef2204a7109ad3f3875c5e09be01b236de5d3b199a1736f9768046fe0701e380e

  • memory/1048-9-0x0000000002040000-0x0000000002050000-memory.dmp

    Filesize

    64KB

  • memory/1048-8-0x0000000002040000-0x0000000002050000-memory.dmp

    Filesize

    64KB

  • memory/1048-7-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1048-10-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1048-12-0x0000000002040000-0x0000000002050000-memory.dmp

    Filesize

    64KB

  • memory/1048-13-0x0000000002040000-0x0000000002050000-memory.dmp

    Filesize

    64KB

  • memory/4900-0-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4900-2-0x00000000005C0000-0x00000000005D0000-memory.dmp

    Filesize

    64KB

  • memory/4900-1-0x00000000005C0000-0x00000000005D0000-memory.dmp

    Filesize

    64KB

  • memory/4900-4-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB