Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2024 09:46

General

  • Target

    a20ffde4a70678d87e47494da25010d6_JaffaCakes118.exe

  • Size

    278KB

  • MD5

    a20ffde4a70678d87e47494da25010d6

  • SHA1

    5cf80cbe7bcaddd3f9731c94c2913d34c7c89ae4

  • SHA256

    b79adcb51cc919bc87f1b1f82d37418e8b14eb33b805a07cd1047cfd7e58cdea

  • SHA512

    0ea82491bf66721a9f80aad5a4c1d283f83a0bdee2453911d5ed3c55e0064a50c3c7ae1f1d8ffca7a8845a457c7418dab2fae4f51dcdfa1beb80759bed99fe85

  • SSDEEP

    6144:tdN39Z+vQsYFiqav4nDWgRAkP0KGQn8xID0DMFLqCtOiuU2yyvDMTQQ:NtZ+4sN2R3P9GLxe0D4H1ovDMT5

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a20ffde4a70678d87e47494da25010d6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\a20ffde4a70678d87e47494da25010d6_JaffaCakes118.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:4512
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k ixpuof
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:1964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\eyopuz.dll

    Filesize

    89KB

    MD5

    32bbdc3d3b1646c2e10de1d5f16543d1

    SHA1

    f861f0cc36c6b29212a2f63de3706f66ce7524df

    SHA256

    0e7d6b873eb663481e68a0bf23e563158ef98712a64634936a56289ef85a551a

    SHA512

    2886742650786c83c0fe104e9bfa43a71138c1d13d478d7bb32fe50ba6144b949fa9b8d7b6904f46ac77cff1c8300154411900c4e80663b8e67c6355df32a6f5

  • memory/4512-0-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4512-1-0x0000000000A10000-0x0000000000A50000-memory.dmp

    Filesize

    256KB

  • memory/4512-2-0x00000000006F0000-0x00000000006F1000-memory.dmp

    Filesize

    4KB

  • memory/4512-3-0x0000000000A10000-0x0000000000A50000-memory.dmp

    Filesize

    256KB

  • memory/4512-7-0x0000000000401000-0x0000000000403000-memory.dmp

    Filesize

    8KB

  • memory/4512-5-0x0000000002560000-0x0000000002650000-memory.dmp

    Filesize

    960KB

  • memory/4512-10-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/4512-16-0x0000000000A10000-0x0000000000A50000-memory.dmp

    Filesize

    256KB