Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 16:57

General

  • Target

    b8690f7ee3b6cf7fe9825a5e20b4936e_JaffaCakes118.exe

  • Size

    84KB

  • MD5

    b8690f7ee3b6cf7fe9825a5e20b4936e

  • SHA1

    32a8b6744a3dee1639c122aa8c65d118d0035bc8

  • SHA256

    e243d95c57543519180e27aee86fbe0f0bf43ab7da5b76e794fcb5b3b0e378eb

  • SHA512

    42918a60c2336862fd0d560f5e50153385333fcf5d85418e85a248a2b76f8e505368f84d9ec87212ca0a097ebfff1038c9b132c9ea23557c059fb59ccf3d2374

  • SSDEEP

    1536:IHUwJ8CqX7iJDFDkFH5bm7UWI3SioeI1N+bTe642sS:GPqX7Op05bUhILIz+e64M

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8690f7ee3b6cf7fe9825a5e20b4936e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b8690f7ee3b6cf7fe9825a5e20b4936e_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\WSyEndas.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3848
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\WSyEndas.dll",iep
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:4868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WSyEndas.dll

    Filesize

    84KB

    MD5

    15a2f773f104451fdb8a47bf9325dadc

    SHA1

    fed15566c56911856df1bbf3485ea9bd5ffad015

    SHA256

    13d587c823214698af28b9d754960a9753e4af56c2c34f6334e66a7ef287d1d8

    SHA512

    d9987a46d83e45af79aeafacba50250b2385248276fb3816c69e0513aef872111bdb65356bf11949ceb9ef88dfe30a972564b843b6dce4927319053a2e5ea907

  • memory/2776-10-0x0000000002240000-0x0000000002250000-memory.dmp

    Filesize

    64KB

  • memory/2776-2-0x0000000010000000-0x0000000010015000-memory.dmp

    Filesize

    84KB

  • memory/2776-1-0x0000000002240000-0x0000000002250000-memory.dmp

    Filesize

    64KB

  • memory/2776-14-0x0000000010000000-0x0000000010015000-memory.dmp

    Filesize

    84KB

  • memory/2776-0-0x0000000002240000-0x0000000002250000-memory.dmp

    Filesize

    64KB

  • memory/2776-11-0x0000000002240000-0x0000000002250000-memory.dmp

    Filesize

    64KB

  • memory/3848-13-0x00000000007E0000-0x00000000007F0000-memory.dmp

    Filesize

    64KB

  • memory/3848-8-0x00000000007E0000-0x00000000007F0000-memory.dmp

    Filesize

    64KB

  • memory/3848-12-0x00000000007E0000-0x00000000007F0000-memory.dmp

    Filesize

    64KB

  • memory/3848-9-0x00000000007E0000-0x00000000007F0000-memory.dmp

    Filesize

    64KB

  • memory/3848-7-0x0000000010000000-0x0000000010015000-memory.dmp

    Filesize

    84KB

  • memory/3848-15-0x0000000010000000-0x0000000010015000-memory.dmp

    Filesize

    84KB

  • memory/3848-21-0x0000000010000000-0x0000000010015000-memory.dmp

    Filesize

    84KB

  • memory/3848-27-0x0000000010000000-0x0000000010015000-memory.dmp

    Filesize

    84KB

  • memory/4868-23-0x00000000025E0000-0x00000000025F0000-memory.dmp

    Filesize

    64KB

  • memory/4868-22-0x00000000025E0000-0x00000000025F0000-memory.dmp

    Filesize

    64KB

  • memory/4868-25-0x00000000025E0000-0x00000000025F0000-memory.dmp

    Filesize

    64KB

  • memory/4868-26-0x00000000025E0000-0x00000000025F0000-memory.dmp

    Filesize

    64KB

  • memory/4868-28-0x0000000010000000-0x0000000010015000-memory.dmp

    Filesize

    84KB