Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2024, 09:19

General

  • Target

    4535570af096c67d458fb4413f103095_JaffaCakes118.exe

  • Size

    214KB

  • MD5

    4535570af096c67d458fb4413f103095

  • SHA1

    3d03f4a8569f5b9ff42c1a3ad8ab39643e4ca2ca

  • SHA256

    0be7313f8e2fc4b38bcfee4e90eaf711d5be54545e9eca51093d3cf111257da5

  • SHA512

    f7b73cd81bbf6269180967d6d67907e3e17569715da77ceb117e66830f264f56325b35b8798bfeda1ab775af98c04b6de08f9961af6f035f033930ae475dfff6

  • SSDEEP

    6144:OZ7a9ytXnyTZgB4jbJbD4JDTXT/THjPWIal:OZjwIIbJbMB3Hj+Ia

Score
8/10

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4535570af096c67d458fb4413f103095_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\4535570af096c67d458fb4413f103095_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1332
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    PID:2668

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\brc_Server.dat

    Filesize

    200B

    MD5

    0fdfa34fc2a78c6ef60d66b68ac6be8a

    SHA1

    715b05b198ec520c800aec602021e1024c1d0949

    SHA256

    7b02d6590783ccc84717a0817b7744f1e996b3b6a17fda5cd1207593cf846ef6

    SHA512

    0752c1a0b7d85e41175f4ef6438d6274b2c573ae6b2c15769f4dba4ca0ab476506871d23ac2142e225023f0836a80998253e732aa1e18a9810ac708becf8798a

  • \??\c:\windows\SysWOW64\brc_server.dll

    Filesize

    331KB

    MD5

    50082b8a2b6182cf467005de30db913e

    SHA1

    88911691f3f36d22af3c3b99eb66f539ce377049

    SHA256

    8d69a82476384544aeb8ef907e73d5ec006668c0a9f96c8bc28ef2be18f2acd7

    SHA512

    aca46ba65e79623392e8b9f673932c625a132a055be6c957fa4d61613d01e485f945d7364ddfc87bc609e7379cc85a8bd4eae0775e2cb9d161a4f35c8471bb7f

  • memory/1332-0-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1332-1-0x0000000002200000-0x0000000002201000-memory.dmp

    Filesize

    4KB

  • memory/1332-2-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/1332-9-0x0000000000400000-0x00000000004BA000-memory.dmp

    Filesize

    744KB

  • memory/2668-11-0x0000000001400000-0x0000000001461000-memory.dmp

    Filesize

    388KB

  • memory/2668-10-0x0000000001400000-0x0000000001461000-memory.dmp

    Filesize

    388KB

  • memory/2668-13-0x0000000001400000-0x0000000001461000-memory.dmp

    Filesize

    388KB

  • memory/2668-12-0x000000000145E000-0x0000000001460000-memory.dmp

    Filesize

    8KB

  • memory/2668-15-0x0000000001400000-0x0000000001461000-memory.dmp

    Filesize

    388KB

  • memory/2668-17-0x000000000145E000-0x0000000001460000-memory.dmp

    Filesize

    8KB