Analysis

  • max time kernel
    130s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/08/2024, 18:54

General

  • Target

    bcc85db0bfb8e451462f1cabe641ff94_JaffaCakes118.dll

  • Size

    82KB

  • MD5

    bcc85db0bfb8e451462f1cabe641ff94

  • SHA1

    5ac191abfc9284668978031d4ead108c7205970e

  • SHA256

    f1562e275bdba85d9dd9fa5b67ec17043cb5042ab5a55e9200c858d909f4669a

  • SHA512

    bf0eaa19b7e50892333a6575efe696644b1be8d6e3562fcc8c18f88af0fe0a606aa58b87bebb157c87bcd8bfc40dab4f4d8e02f495e7f8497d046c370f51e749

  • SSDEEP

    1536:iAWgbXddw+fva3/8W7d+G5IrUVSRPF0h8k79Pl5E0HW6xxQIk1UiOw3:DFrddVva3UWxPQRPFidkl6iO+

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\bcc85db0bfb8e451462f1cabe641ff94_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\bcc85db0bfb8e451462f1cabe641ff94_JaffaCakes118.dll
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1688
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 596
        3⤵
        • Program crash
        PID:2532
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1688 -ip 1688
    1⤵
      PID:4692

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1688-0-0x0000000001F50000-0x0000000001F8E000-memory.dmp

            Filesize

            248KB

          • memory/1688-1-0x0000000001F50000-0x0000000001F8E000-memory.dmp

            Filesize

            248KB

          • memory/1688-2-0x0000000001F50000-0x0000000001F8E000-memory.dmp

            Filesize

            248KB