Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
5b6949c9f8b6d62974ed81b69a056274_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5b6949c9f8b6d62974ed81b69a056274_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5b6949c9f8b6d62974ed81b69a056274_JaffaCakes118.exe
-
Size
88KB
-
MD5
5b6949c9f8b6d62974ed81b69a056274
-
SHA1
5a3fca476348d6dfd1ec8dee31b34ac4bf00594d
-
SHA256
573f502bca5ff5945274764eeeb50e68245d5fc5d2bf1c487a0eb57daaa060a3
-
SHA512
ea86f27e89f0319d554de62f971e4756ee66b30c66bfd8a6c38b1e0ddcca36d89f82487e994ced59c51f257f4ce43d1314b876f658b27ba1a18e19f4e736a1e3
-
SSDEEP
1536:bd9rdvdlqeRFqcoWHWnYCyjQ0O4n9yhZN4DrRshHAHTMYtJqFvgioNrQewpVt:jd2RcjaYZjQZ4n9yz+pshHAwYtEFvYNC
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1032 rundll32.exe 4068 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tsihicawaj = "rundll32.exe \"C:\\Users\\Admin\\AppData\\Local\\Wipc1al.dll\",Startup" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1032 rundll32.exe 1032 rundll32.exe 1032 rundll32.exe 1032 rundll32.exe 1032 rundll32.exe 1032 rundll32.exe 1032 rundll32.exe 1032 rundll32.exe 1032 rundll32.exe 1032 rundll32.exe 1032 rundll32.exe 1032 rundll32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1032 2016 5b6949c9f8b6d62974ed81b69a056274_JaffaCakes118.exe 86 PID 2016 wrote to memory of 1032 2016 5b6949c9f8b6d62974ed81b69a056274_JaffaCakes118.exe 86 PID 2016 wrote to memory of 1032 2016 5b6949c9f8b6d62974ed81b69a056274_JaffaCakes118.exe 86 PID 1032 wrote to memory of 4068 1032 rundll32.exe 98 PID 1032 wrote to memory of 4068 1032 rundll32.exe 98 PID 1032 wrote to memory of 4068 1032 rundll32.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b6949c9f8b6d62974ed81b69a056274_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5b6949c9f8b6d62974ed81b69a056274_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Wipc1al.dll",Startup2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Wipc1al.dll",iep3⤵
- Loads dropped DLL
PID:4068
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5260fbd9e692c87b5ca874ca92f64b1ee
SHA13d76314bf853361b8fa4b58c908771ab1a4c8fb9
SHA256c5a9184f0efa0a9f9bfe4384140c61c043bc10d0831ec49557375a7c443bd853
SHA51263ffb46f0e7fa2b398e62b45f4242290c653e645122738470b29d9dfcdcb7398016b0828894434fbc46f2e2508294102772793a02b1fa6712d795d8bde797816