Resubmissions

10-09-2024 08:12

240910-j3v7wstemj 10

10-09-2024 08:05

240910-jy5krsvflc 10

Analysis

  • max time kernel
    20s
  • max time network
    20s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-09-2024 08:12

General

  • Target

    d7d9a82bf38ccdfbb92810d55f99fb11_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    d7d9a82bf38ccdfbb92810d55f99fb11

  • SHA1

    05eaf56d92f83b01ea274d9b2b631be7a7c2c244

  • SHA256

    45ea17cda42dbb123700c40421be29f9c21ae40395d3ebdf716b7706eb2e827b

  • SHA512

    3129433837280b921e6958587eae6594ddb4b3d128d7818aafec6ded7da685689beb31e43b54e40105c67316d6e586575d080dad884b7980d667d0c666224cec

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ/:0UzeyQMS4DqodCnoe+iitjWwwz

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 11 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d7d9a82bf38ccdfbb92810d55f99fb11_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d7d9a82bf38ccdfbb92810d55f99fb11_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:180
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:4820
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:3500
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4656,i,16315016104747277319,5510969007830467313,262144 --variations-seed-version --mojo-platform-channel-handle=4628 /prefetch:8
        1⤵
          PID:5064
        • C:\Windows\System32\rundll32.exe
          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
          1⤵
            PID:4616
          • C:\Windows\system32\mspaint.exe
            "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\ApproveSkip.png" /ForceBootstrapPaint3D
            1⤵
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:1992
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
            1⤵
            • Drops file in System32 directory
            PID:2428
          • C:\Windows\system32\OpenWith.exe
            C:\Windows\system32\OpenWith.exe -Embedding
            1⤵
            • Suspicious use of SetWindowsHookEx
            PID:1652

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\Parameters.ini

            Filesize

            74B

            MD5

            6687785d6a31cdf9a5f80acb3abc459b

            SHA1

            1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9

            SHA256

            3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b

            SHA512

            5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

          • memory/180-0-0x00000000007D0000-0x00000000007D1000-memory.dmp

            Filesize

            4KB

          • memory/180-67-0x00000000007D0000-0x00000000007D1000-memory.dmp

            Filesize

            4KB

          • memory/180-66-0x0000000000400000-0x00000000005D3000-memory.dmp

            Filesize

            1.8MB

          • memory/2428-79-0x0000014EEA850000-0x0000014EEA851000-memory.dmp

            Filesize

            4KB

          • memory/2428-72-0x0000014EE2560000-0x0000014EE2570000-memory.dmp

            Filesize

            64KB

          • memory/2428-68-0x0000014EE1BC0000-0x0000014EE1BD0000-memory.dmp

            Filesize

            64KB

          • memory/2428-81-0x0000014EEA8D0000-0x0000014EEA8D1000-memory.dmp

            Filesize

            4KB

          • memory/2428-83-0x0000014EEA8D0000-0x0000014EEA8D1000-memory.dmp

            Filesize

            4KB

          • memory/2428-85-0x0000014EEA960000-0x0000014EEA961000-memory.dmp

            Filesize

            4KB

          • memory/2428-84-0x0000014EEA960000-0x0000014EEA961000-memory.dmp

            Filesize

            4KB

          • memory/2428-86-0x0000014EEA970000-0x0000014EEA971000-memory.dmp

            Filesize

            4KB

          • memory/2428-87-0x0000014EEA970000-0x0000014EEA971000-memory.dmp

            Filesize

            4KB