Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/08/2024, 01:39

General

  • Target

    887f6f6efb43d5ca4fb779ab18a57461_JaffaCakes118.exe

  • Size

    171KB

  • MD5

    887f6f6efb43d5ca4fb779ab18a57461

  • SHA1

    a9b416398f89b1e8c04fb5577c6bb22ef1335ff9

  • SHA256

    bb2dcfc2a9edd0a62d91e11518d1f6ccaafa65feb9cdc5f98ba09c89ac3cd63d

  • SHA512

    c6b7bee61a1f04018f787b5569c0782023dc3f1d2e0fa0706be9b2be5ce659d20881cb8a0dce20161bb9ddd6e88ecc28375e987415a3bf6ac749bfc4b1094bf3

  • SSDEEP

    3072:aIw5hKfjW326tqcwGhNqboIrH0QvfudHMSd4LLAjvQNnDdUtbWqk:aFRDkWN3I1fuirLLAjYNnDdiu

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 39 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\887f6f6efb43d5ca4fb779ab18a57461_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\887f6f6efb43d5ca4fb779ab18a57461_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /installservice
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      PID:4956
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /start
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      PID:4964
    • C:\Windows\SysWOW64\urdvxc.exe
      C:\Windows\system32\urdvxc.exe /uninstallservice patch:C:\Users\Admin\AppData\Local\Temp\887f6f6efb43d5ca4fb779ab18a57461_JaffaCakes118.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Modifies registry class
      PID:2236
  • C:\Windows\SysWOW64\urdvxc.exe
    "C:\Windows\SysWOW64\urdvxc.exe" /service
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Modifies registry class
    PID:3636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\urdvxc.exe

    Filesize

    171KB

    MD5

    887f6f6efb43d5ca4fb779ab18a57461

    SHA1

    a9b416398f89b1e8c04fb5577c6bb22ef1335ff9

    SHA256

    bb2dcfc2a9edd0a62d91e11518d1f6ccaafa65feb9cdc5f98ba09c89ac3cd63d

    SHA512

    c6b7bee61a1f04018f787b5569c0782023dc3f1d2e0fa0706be9b2be5ce659d20881cb8a0dce20161bb9ddd6e88ecc28375e987415a3bf6ac749bfc4b1094bf3

  • memory/2236-39-0x0000000000190000-0x00000000001AF000-memory.dmp

    Filesize

    124KB

  • memory/2904-38-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/2904-0-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2904-1-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-49-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-52-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-19-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-20-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-21-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-22-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-23-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-24-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-25-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-26-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-27-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-28-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-29-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-30-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-31-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-32-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-33-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-51-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-35-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-36-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-17-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-13-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-40-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-41-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-42-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-43-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-44-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-45-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-46-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-47-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-48-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-12-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-18-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-50-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-34-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-53-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-54-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-55-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-56-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-57-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-58-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-59-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-60-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-61-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-62-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-63-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-64-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-65-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-66-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-67-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-68-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-69-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-70-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-71-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-72-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-73-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-74-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-75-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-76-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-77-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-78-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-79-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/3636-1292-0x00000000001B0000-0x00000000001CF000-memory.dmp

    Filesize

    124KB

  • memory/4956-6-0x00000000000E0000-0x00000000000FF000-memory.dmp

    Filesize

    124KB

  • memory/4956-7-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4956-8-0x00000000000E0000-0x00000000000FF000-memory.dmp

    Filesize

    124KB

  • memory/4964-11-0x00000000000C0000-0x00000000000DF000-memory.dmp

    Filesize

    124KB