Analysis

  • max time kernel
    140s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 09:44

General

  • Target

    5b6949c9f8b6d62974ed81b69a056274_JaffaCakes118.exe

  • Size

    88KB

  • MD5

    5b6949c9f8b6d62974ed81b69a056274

  • SHA1

    5a3fca476348d6dfd1ec8dee31b34ac4bf00594d

  • SHA256

    573f502bca5ff5945274764eeeb50e68245d5fc5d2bf1c487a0eb57daaa060a3

  • SHA512

    ea86f27e89f0319d554de62f971e4756ee66b30c66bfd8a6c38b1e0ddcca36d89f82487e994ced59c51f257f4ce43d1314b876f658b27ba1a18e19f4e736a1e3

  • SSDEEP

    1536:bd9rdvdlqeRFqcoWHWnYCyjQ0O4n9yhZN4DrRshHAHTMYtJqFvgioNrQewpVt:jd2RcjaYZjQZ4n9yz+pshHAwYtEFvYNC

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b6949c9f8b6d62974ed81b69a056274_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5b6949c9f8b6d62974ed81b69a056274_JaffaCakes118.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Wipc1al.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1032
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\Wipc1al.dll",iep
        3⤵
        • Loads dropped DLL
        PID:4068

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Wipc1al.dll

          Filesize

          88KB

          MD5

          260fbd9e692c87b5ca874ca92f64b1ee

          SHA1

          3d76314bf853361b8fa4b58c908771ab1a4c8fb9

          SHA256

          c5a9184f0efa0a9f9bfe4384140c61c043bc10d0831ec49557375a7c443bd853

          SHA512

          63ffb46f0e7fa2b398e62b45f4242290c653e645122738470b29d9dfcdcb7398016b0828894434fbc46f2e2508294102772793a02b1fa6712d795d8bde797816

        • memory/1032-21-0x0000000010000000-0x0000000010016000-memory.dmp

          Filesize

          88KB

        • memory/1032-17-0x00000000021B0000-0x00000000021C0000-memory.dmp

          Filesize

          64KB

        • memory/1032-24-0x0000000010000000-0x0000000010016000-memory.dmp

          Filesize

          88KB

        • memory/1032-16-0x00000000021B0000-0x00000000021C0000-memory.dmp

          Filesize

          64KB

        • memory/1032-7-0x00000000021B0000-0x00000000021C0000-memory.dmp

          Filesize

          64KB

        • memory/1032-9-0x0000000010000000-0x0000000010016000-memory.dmp

          Filesize

          88KB

        • memory/1032-8-0x00000000021B0000-0x00000000021C0000-memory.dmp

          Filesize

          64KB

        • memory/1032-11-0x0000000010000000-0x0000000010016000-memory.dmp

          Filesize

          88KB

        • memory/2016-2-0x0000000002380000-0x0000000002390000-memory.dmp

          Filesize

          64KB

        • memory/2016-15-0x0000000002380000-0x0000000002390000-memory.dmp

          Filesize

          64KB

        • memory/2016-10-0x0000000010000000-0x0000000010016000-memory.dmp

          Filesize

          88KB

        • memory/2016-14-0x0000000002380000-0x0000000002390000-memory.dmp

          Filesize

          64KB

        • memory/2016-0-0x0000000010000000-0x0000000010016000-memory.dmp

          Filesize

          88KB

        • memory/2016-1-0x0000000002380000-0x0000000002390000-memory.dmp

          Filesize

          64KB

        • memory/4068-23-0x0000000002630000-0x0000000002640000-memory.dmp

          Filesize

          64KB

        • memory/4068-22-0x0000000002630000-0x0000000002640000-memory.dmp

          Filesize

          64KB

        • memory/4068-25-0x0000000010000000-0x0000000010016000-memory.dmp

          Filesize

          88KB

        • memory/4068-29-0x0000000002630000-0x0000000002640000-memory.dmp

          Filesize

          64KB

        • memory/4068-28-0x0000000002630000-0x0000000002640000-memory.dmp

          Filesize

          64KB