Analysis

  • max time kernel
    144s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-09-2024 08:51

General

  • Target

    dfda8d9648d6afbeddffc0ac48d983c8_JaffaCakes118.exe

  • Size

    1.0MB

  • MD5

    dfda8d9648d6afbeddffc0ac48d983c8

  • SHA1

    26abf16d7da0611b60b00c7007752c05022147e8

  • SHA256

    c16f9b0d5806e82b7e32842e78d243ecaed45ec63fb2230268a0fe9172f56172

  • SHA512

    28c5286cb7cac652252c2f49f21b701d9403c8a7d97a6c20f2a26e5696dace16ec39dcbb381a85f4022c7b8e8ef34929220b7fdee2059ed39a8a8f42d96c341c

  • SSDEEP

    24576:DEwIcDqQlKqNtTFrmL8QeogUQhhA5b4lypPMwY:xDqQhrTZqepDAV48PMf

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 33 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dfda8d9648d6afbeddffc0ac48d983c8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dfda8d9648d6afbeddffc0ac48d983c8_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe PlayaPeppercorn,Output
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2924
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Euphorbium

    Filesize

    893KB

    MD5

    7bdfdcfb6044b454a3128b2efd7a5c3e

    SHA1

    ca2b489b027f6a97edbf7246d94c5d42098e098b

    SHA256

    d443a6a90ef5740ac7cbcb38b9093fc7017f61946660d432b5b14fe490043369

    SHA512

    91b0f93d99a5e9ef8e47533f63d616005df99eaf7e77303cad647f7bc96bff319123fd2a435e35c14a530a697fbe752723a8b2ce420dbda6f8e93459da7c4920

  • C:\Users\Admin\AppData\Local\Temp\PlayaPeppercorn.dll

    Filesize

    44KB

    MD5

    2fd1d4cb3441a4d6ebb4956dd1ac37fa

    SHA1

    69ffdf0a02ef60ed7f92416361e93c435b61e16e

    SHA256

    f13706ccf8f5ce81d048ef1c8c58e290258c02b87c3ed640c07606db601882b4

    SHA512

    4fdcea08ca11cc67f153c94d9777c90d8221cbedf9302367ee98451619b2485ac0875d8efc18a14b64edec268dd7358e98cbb53a0874838b50321e443ea3deaf

  • memory/2924-34-0x0000000074B50000-0x0000000074C18000-memory.dmp

    Filesize

    800KB

  • memory/2924-28-0x0000000074B50000-0x0000000074C18000-memory.dmp

    Filesize

    800KB

  • memory/2924-29-0x0000000075D60000-0x0000000075DC3000-memory.dmp

    Filesize

    396KB

  • memory/2924-27-0x0000000002550000-0x0000000002553000-memory.dmp

    Filesize

    12KB

  • memory/4024-30-0x0000000074462000-0x0000000074463000-memory.dmp

    Filesize

    4KB

  • memory/4024-31-0x0000000074460000-0x0000000074A11000-memory.dmp

    Filesize

    5.7MB

  • memory/4024-32-0x0000000074460000-0x0000000074A11000-memory.dmp

    Filesize

    5.7MB

  • memory/4024-33-0x0000000000920000-0x0000000000926000-memory.dmp

    Filesize

    24KB

  • memory/4024-35-0x0000000074460000-0x0000000074A11000-memory.dmp

    Filesize

    5.7MB

  • memory/4024-37-0x0000000074462000-0x0000000074463000-memory.dmp

    Filesize

    4KB

  • memory/4024-38-0x0000000074460000-0x0000000074A11000-memory.dmp

    Filesize

    5.7MB

  • memory/4024-39-0x0000000074460000-0x0000000074A11000-memory.dmp

    Filesize

    5.7MB