Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 08:23

General

  • Target

    0504d04c5eb3c983f6aac0b3d185332c_JaffaCakes118.dll

  • Size

    571KB

  • MD5

    0504d04c5eb3c983f6aac0b3d185332c

  • SHA1

    c1908c67bc5a8800aa3775ad3816420eabfcc619

  • SHA256

    8762edd300bc7cc4719686b2f186c5d1f398f07ba8d79315c5822d49dddfef8c

  • SHA512

    ae33eedecfae03862265ad64b0fa19929fd2cfd172dab96f6029b9fc8f03c0268b0b0810da830f9a995c95b191fc26ee5694b811eae65e4d79c852bff75ebe39

  • SSDEEP

    12288:qzA5lZhy6RpB/6eXMVVLrkwTzCunpKI13YEqW8qnPuH+VLB:qzA5HhRPSeX2VHkuzRnpz1one/

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\0504d04c5eb3c983f6aac0b3d185332c_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\0504d04c5eb3c983f6aac0b3d185332c_JaffaCakes118.dll,#1
      2⤵
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3724
      • C:\Windows\SysWOW64\rundll32mgr.exe
        C:\Windows\SysWOW64\rundll32mgr.exe
        3⤵
        • Executes dropped EXE
        PID:2204
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 260
          4⤵
          • Program crash
          PID:4956
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3724 -s 608
        3⤵
        • Program crash
        PID:2008
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2204 -ip 2204
    1⤵
      PID:1964
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3724 -ip 3724
      1⤵
        PID:1320

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Windows\SysWOW64\rundll32mgr.exe

              Filesize

              160KB

              MD5

              10b233d4269f3feaa989970f3abca318

              SHA1

              5449fd61b5e17a1de9df33f156b695b3a140c219

              SHA256

              3f5b12781d6c9143e6de783eb8b975f750ea61cab675be09487802bc6269fc9f

              SHA512

              a827b53cb12947e120609e5c35e4fc4303f0ffed45e54e93cb0cfb3b509c3917267b7038a0b30763f3fd41e5e42e94b62f88d2d6cd934ade21fc71888ef994ff

            • memory/2204-5-0x0000000000400000-0x0000000000462000-memory.dmp

              Filesize

              392KB

            • memory/2204-6-0x0000000000690000-0x0000000000691000-memory.dmp

              Filesize

              4KB

            • memory/2204-8-0x0000000000400000-0x0000000000462000-memory.dmp

              Filesize

              392KB

            • memory/3724-1-0x00000000752D0000-0x0000000075365000-memory.dmp

              Filesize

              596KB

            • memory/3724-9-0x00000000752D0000-0x0000000075365000-memory.dmp

              Filesize

              596KB