Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 21:11

General

  • Target

    8392290af372489dc65f95500a50f309_JaffaCakes118.exe

  • Size

    96KB

  • MD5

    8392290af372489dc65f95500a50f309

  • SHA1

    b58a0bb7713aa93c3bddaa0c059c950b7bc6d555

  • SHA256

    f9c50c6c972211098240be120e2c11b1269723f5cbb01b2b5d3746682e43e2c4

  • SHA512

    8799b977ecd56871030aec95d83cef49b0a290ba96b388bba22710a14a30250cd9b51866319ae352104afe8dbd4a43c7fa8f697fd1882cb982764dc197e429ff

  • SSDEEP

    1536:sNo3AyIK6zjSJq9FfHo6H98xbzkcdNU0AQFGOu7XfK3ajG4daUdJ9b:sNowVxeYbo6cXNdGOuW94dZf9

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8392290af372489dc65f95500a50f309_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\8392290af372489dc65f95500a50f309_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:652
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\LTororU.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4996
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\LTororU.dll",iep
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\LTororU.dll

    Filesize

    96KB

    MD5

    ee482cac697b610d373d7bb5a4cf8877

    SHA1

    c28e87d1dcba94f600b8aee76fd7d3414f9a4488

    SHA256

    0c095a32a0a168d161ecb25107c3243a441c1cf7309ff7810a5864413167563e

    SHA512

    00fe94f52a1fa0b270defa47d30eec150f0e3064451d5c0ccde8ecd49d90fe37371188bd465acd13134c78602b56ff4fe54856127f1a147a6a9b3f08e23d250e

  • memory/652-10-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/652-2-0x00000000023D0000-0x00000000023E0000-memory.dmp

    Filesize

    64KB

  • memory/652-1-0x00000000023D0000-0x00000000023E0000-memory.dmp

    Filesize

    64KB

  • memory/652-0-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/652-15-0x00000000023D0000-0x00000000023E0000-memory.dmp

    Filesize

    64KB

  • memory/652-14-0x00000000023D0000-0x00000000023E0000-memory.dmp

    Filesize

    64KB

  • memory/2056-22-0x00000000029E0000-0x00000000029F0000-memory.dmp

    Filesize

    64KB

  • memory/2056-23-0x00000000029E0000-0x00000000029F0000-memory.dmp

    Filesize

    64KB

  • memory/2056-25-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/2056-29-0x00000000029E0000-0x00000000029F0000-memory.dmp

    Filesize

    64KB

  • memory/2056-28-0x00000000029E0000-0x00000000029F0000-memory.dmp

    Filesize

    64KB

  • memory/4996-11-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/4996-7-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/4996-9-0x0000000002780000-0x0000000002790000-memory.dmp

    Filesize

    64KB

  • memory/4996-16-0x0000000002780000-0x0000000002790000-memory.dmp

    Filesize

    64KB

  • memory/4996-17-0x0000000002780000-0x0000000002790000-memory.dmp

    Filesize

    64KB

  • memory/4996-21-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB

  • memory/4996-8-0x0000000002780000-0x0000000002790000-memory.dmp

    Filesize

    64KB

  • memory/4996-24-0x0000000010000000-0x0000000010018000-memory.dmp

    Filesize

    96KB