Analysis

  • max time kernel
    137s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-07-2024 03:43

General

  • Target

    76ed5dfda9927f2b8855b4474367236a_JaffaCakes118.exe

  • Size

    503KB

  • MD5

    76ed5dfda9927f2b8855b4474367236a

  • SHA1

    50f36f45e84dbb70b8da556b1e1d136f8ead76fd

  • SHA256

    afa69fc0bae31504cd2d0ebb529b153b8b396d99cd2352698d1dd17a41d4b814

  • SHA512

    7de818915e761cd739512a86caadb0532610e99e4b8cffbe604b227347b01da70b8114208200ac728c02f3a96f67458e742b979ada1e11a3ade2a330f54f31d4

  • SSDEEP

    6144:4qseQew6HwolLbgI52iV8MPoRGL3BAFjvkqaAUrQhXCz2+KTDWGY1YozK92T4:4aQn6/BgIYJ64wq/bpY2+KWPm2T4

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76ed5dfda9927f2b8855b4474367236a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\76ed5dfda9927f2b8855b4474367236a_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3884
    • C:\Users\Admin\AppData\Roaming\shdwin32img\shdwin32img.exe
      C:\Users\Admin\AppData\Roaming\shdwin32img\shdwin32img.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Roaming\SHDWIN~1\SHDWIN~1.DLL 000
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2980
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 744
          4⤵
          • Program crash
          PID:4816
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2980 -ip 2980
    1⤵
      PID:2256

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\SHDWIN~1\lbrk.dll

      Filesize

      160KB

      MD5

      30d8b5131cf5a8b59f329fd3c447eabc

      SHA1

      e3ddf1361ad701e56cac583022d205e93df46395

      SHA256

      b9a4efa07ea621c19b891ce6a65d6d6696e4257370adb9319cbe935c64c55131

      SHA512

      5fc0c06650f1c3bae970fd9f7fe83b8c9308f35321d19783a2fc23b1192ac585ff3481b54dfca5dc1fef212aa26a8ea7d6da2b3ea80ca8689cd3c18ed37c218f

    • C:\Users\Admin\AppData\Roaming\shdwin32img\shdwin32img.dll

      Filesize

      233KB

      MD5

      75be953cf43de0d912be67442cd9a5e9

      SHA1

      fe699f681582cdf252ea8292196f9d8b80a699b3

      SHA256

      8fe0040d017b9e4b7e88a79397d19b909bd46e7523c738313c60f85a497167d8

      SHA512

      e67a52550ad204ef19bc21893099ea4dc5a90b57f3bf5c563d024b2b2e68efd1ea8dd63be0f1560d7431a164f6feb50235bfa2e274e3cc01bfc131674eb818ac

    • C:\Users\Admin\AppData\Roaming\shdwin32img\shdwin32img.exe

      Filesize

      503KB

      MD5

      76ed5dfda9927f2b8855b4474367236a

      SHA1

      50f36f45e84dbb70b8da556b1e1d136f8ead76fd

      SHA256

      afa69fc0bae31504cd2d0ebb529b153b8b396d99cd2352698d1dd17a41d4b814

      SHA512

      7de818915e761cd739512a86caadb0532610e99e4b8cffbe604b227347b01da70b8114208200ac728c02f3a96f67458e742b979ada1e11a3ade2a330f54f31d4

    • memory/2980-25-0x0000000002590000-0x00000000025BA000-memory.dmp

      Filesize

      168KB

    • memory/2980-29-0x0000000002590000-0x00000000025BA000-memory.dmp

      Filesize

      168KB

    • memory/2980-34-0x0000000002590000-0x00000000025BA000-memory.dmp

      Filesize

      168KB

    • memory/2980-32-0x0000000010000000-0x0000000010044000-memory.dmp

      Filesize

      272KB

    • memory/2980-17-0x0000000010000000-0x0000000010044000-memory.dmp

      Filesize

      272KB

    • memory/2980-16-0x0000000010000000-0x0000000010044000-memory.dmp

      Filesize

      272KB

    • memory/2980-26-0x0000000002590000-0x00000000025BA000-memory.dmp

      Filesize

      168KB

    • memory/2980-31-0x0000000000BF0000-0x0000000000BF1000-memory.dmp

      Filesize

      4KB

    • memory/2980-30-0x0000000000BF0000-0x0000000000BF1000-memory.dmp

      Filesize

      4KB

    • memory/2980-27-0x0000000010000000-0x0000000010044000-memory.dmp

      Filesize

      272KB

    • memory/2980-28-0x0000000010001000-0x0000000010006000-memory.dmp

      Filesize

      20KB

    • memory/3488-13-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3488-10-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3884-7-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3884-0-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/3884-2-0x0000000000401000-0x0000000000402000-memory.dmp

      Filesize

      4KB

    • memory/3884-1-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB