Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 03:52

General

  • Target

    bdd7d07587d585f9ed520a900240e7a8_JaffaCakes118.exe

  • Size

    88KB

  • MD5

    bdd7d07587d585f9ed520a900240e7a8

  • SHA1

    fab101681c49fa2f9e41e536373a7a6b6ea042d7

  • SHA256

    6690cd20fdcf68bb82c18613c371643263b7dc70143fda0578767aca1fac416a

  • SHA512

    e08e3a65a10eccbf0084407c97adc8be0336e208b27ecd92d978cd2b1da4c1f0e00bcb0b7304cbf932a843f35993b0a8545eda5c3fa10125382389ca1a9da2e8

  • SSDEEP

    1536:mQntytdNg6b3BkPA0zOxP6k11KbfMaceGB1RRHrXSYVQg4ptXIW:nnIjCY0zOkkDKbflcfB1gg4ptXIW

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdd7d07587d585f9ed520a900240e7a8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bdd7d07587d585f9ed520a900240e7a8_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3132
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\LoweDe.dll",Startup
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4836
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\LoweDe.dll",iep
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        PID:1472

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\LoweDe.dll

          Filesize

          88KB

          MD5

          7e55e9d2cd1edf66058b7cd0b2e59118

          SHA1

          afc1106061dbc7ddb29780c4e9df2efe5fc9f4ce

          SHA256

          78ffaeec51761ba68bc19af977b1ac018d236b015b7394f28dd286179026c6ee

          SHA512

          6809516c6844126442a2b9a7de9dc5531b9f93ea448d911a524e2d76e9e80a95bb96142227f7a39cf185eafe8108ce418f8dcc3cdff51407eef3adec555f0752

        • memory/1472-22-0x0000000002470000-0x0000000002480000-memory.dmp

          Filesize

          64KB

        • memory/1472-27-0x0000000010000000-0x0000000010016000-memory.dmp

          Filesize

          88KB

        • memory/1472-24-0x0000000002470000-0x0000000002480000-memory.dmp

          Filesize

          64KB

        • memory/1472-25-0x0000000002470000-0x0000000002480000-memory.dmp

          Filesize

          64KB

        • memory/1472-21-0x0000000002470000-0x0000000002480000-memory.dmp

          Filesize

          64KB

        • memory/3132-0-0x0000000002470000-0x0000000002480000-memory.dmp

          Filesize

          64KB

        • memory/3132-2-0x0000000010000000-0x0000000010016000-memory.dmp

          Filesize

          88KB

        • memory/3132-10-0x0000000002470000-0x0000000002480000-memory.dmp

          Filesize

          64KB

        • memory/3132-11-0x0000000002470000-0x0000000002480000-memory.dmp

          Filesize

          64KB

        • memory/3132-1-0x0000000002470000-0x0000000002480000-memory.dmp

          Filesize

          64KB

        • memory/3132-14-0x0000000010000000-0x0000000010016000-memory.dmp

          Filesize

          88KB

        • memory/4836-13-0x0000000002E70000-0x0000000002E80000-memory.dmp

          Filesize

          64KB

        • memory/4836-15-0x0000000010000000-0x0000000010016000-memory.dmp

          Filesize

          88KB

        • memory/4836-12-0x0000000002E70000-0x0000000002E80000-memory.dmp

          Filesize

          64KB

        • memory/4836-20-0x0000000010000000-0x0000000010016000-memory.dmp

          Filesize

          88KB

        • memory/4836-7-0x0000000010000000-0x0000000010016000-memory.dmp

          Filesize

          88KB

        • memory/4836-9-0x0000000002E70000-0x0000000002E80000-memory.dmp

          Filesize

          64KB

        • memory/4836-8-0x0000000002E70000-0x0000000002E80000-memory.dmp

          Filesize

          64KB

        • memory/4836-26-0x0000000010000000-0x0000000010016000-memory.dmp

          Filesize

          88KB