Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 13:32

General

  • Target

    da739c01185eaa4d40fc599072be2838_JaffaCakes118.exe

  • Size

    367KB

  • MD5

    da739c01185eaa4d40fc599072be2838

  • SHA1

    d078b34087e0ecf58fbf3a387bc640f32da70f6e

  • SHA256

    dfdc52813a2f6c9fed17b860dbf9445e4eced30fe1ed4040da1357861cdca5c0

  • SHA512

    5b193c58c2fd013782de20dcccaa56c45dc9a1ebedb5219f0c8ce07159614ceb97e871730871f97e296e81accf1f17add6d47aeb9bf0df9e0a572e711a116084

  • SSDEEP

    6144:gW5GsMki3/cRuIimctDLsy2PY6OGi17zjUvmxpEt7ncWdCkAbKPmSRoSNJa:V5Gse/cRQtDYnPY9GGzUvmGV4kOVGoSW

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da739c01185eaa4d40fc599072be2838_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\da739c01185eaa4d40fc599072be2838_JaffaCakes118.exe"
    1⤵
    • Drops file in Drivers directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:4536
  • C:\Program Files (x86)\MSN Gaming Zone\Windows\shvlzmdll.exe
    "C:\Program Files (x86)\MSN Gaming Zone\Windows\shvlzmdll.exe"
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1936
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe" 59551
      2⤵
        PID:1928
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1928 -s 12
          3⤵
          • Program crash
          PID:948
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1928 -ip 1928
      1⤵
        PID:2124

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\MSN Gaming Zone\Windows\shvlzmdll.exe

              Filesize

              367KB

              MD5

              da739c01185eaa4d40fc599072be2838

              SHA1

              d078b34087e0ecf58fbf3a387bc640f32da70f6e

              SHA256

              dfdc52813a2f6c9fed17b860dbf9445e4eced30fe1ed4040da1357861cdca5c0

              SHA512

              5b193c58c2fd013782de20dcccaa56c45dc9a1ebedb5219f0c8ce07159614ceb97e871730871f97e296e81accf1f17add6d47aeb9bf0df9e0a572e711a116084

            • memory/1928-7-0x0000000000400000-0x00000000004BF000-memory.dmp

              Filesize

              764KB

            • memory/1936-6-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/1936-8-0x0000000000400000-0x00000000004BF000-memory.dmp

              Filesize

              764KB

            • memory/4536-0-0x0000000000400000-0x00000000004BF000-memory.dmp

              Filesize

              764KB

            • memory/4536-1-0x00000000005C0000-0x00000000005C1000-memory.dmp

              Filesize

              4KB

            • memory/4536-9-0x0000000000400000-0x00000000004BF000-memory.dmp

              Filesize

              764KB