Analysis

  • max time kernel
    145s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    21/08/2024, 10:44

General

  • Target

    b327e5444c5dbf593c876e6a31665596_JaffaCakes118.exe

  • Size

    9.4MB

  • MD5

    b327e5444c5dbf593c876e6a31665596

  • SHA1

    28ca9cc0b3ae2a7225a7a2a54a3da5853daa240a

  • SHA256

    c98129fe4949ddaca5b4ded4b2e554e33f434a916c8a93de248f8d701306f42f

  • SHA512

    653a4b5db215b8a7d11a98483b3de2461402614b36e6aa2fef4fca2ad331f60cb8d6449b92a4f37c3487c92e8779d9bcb4e0988281e651045cd01b3cad8d8308

  • SSDEEP

    3072:9qNR3V7sQ7nM3qIFqbpM3MxkMdY7caHdYmbhlO5bp2iS91PMh4WpL3GfPryW3sb9:9erFJOIplgcaH3SVGMhjL2fDyWvi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b327e5444c5dbf593c876e6a31665596_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b327e5444c5dbf593c876e6a31665596_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2504
    • C:\Windows\SysWOW64\svc2dll.exe
      C:\Windows\system32\svc2dll.exe /ir
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2484
  • C:\Windows\SysWOW64\svc2dll.exe
    C:\Windows\SysWOW64\svc2dll.exe
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2280 -s 244
      2⤵
      • Loads dropped DLL
      • Program crash
      PID:2748

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Windows\SysWOW64\svc2dll.exe

          Filesize

          9.4MB

          MD5

          b327e5444c5dbf593c876e6a31665596

          SHA1

          28ca9cc0b3ae2a7225a7a2a54a3da5853daa240a

          SHA256

          c98129fe4949ddaca5b4ded4b2e554e33f434a916c8a93de248f8d701306f42f

          SHA512

          653a4b5db215b8a7d11a98483b3de2461402614b36e6aa2fef4fca2ad331f60cb8d6449b92a4f37c3487c92e8779d9bcb4e0988281e651045cd01b3cad8d8308

        • memory/2280-19-0x0000000000400000-0x0000000000D6E000-memory.dmp

          Filesize

          9.4MB

        • memory/2280-21-0x0000000000400000-0x0000000000D6E000-memory.dmp

          Filesize

          9.4MB

        • memory/2484-14-0x0000000000400000-0x0000000000D6E000-memory.dmp

          Filesize

          9.4MB

        • memory/2484-22-0x0000000000400000-0x0000000000D6E000-memory.dmp

          Filesize

          9.4MB

        • memory/2504-0-0x0000000000220000-0x0000000000222000-memory.dmp

          Filesize

          8KB

        • memory/2504-1-0x0000000000400000-0x0000000000D6E000-memory.dmp

          Filesize

          9.4MB

        • memory/2504-3-0x0000000000400000-0x0000000000D6E000-memory.dmp

          Filesize

          9.4MB

        • memory/2504-23-0x0000000000400000-0x0000000000D6E000-memory.dmp

          Filesize

          9.4MB

        • memory/2504-29-0x0000000000400000-0x0000000000D6E000-memory.dmp

          Filesize

          9.4MB