Analysis

  • max time kernel
    142s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 02:11

General

  • Target

    086496fb6fe562b586cd3abf1ca6e14a_JaffaCakes118.dll

  • Size

    500KB

  • MD5

    086496fb6fe562b586cd3abf1ca6e14a

  • SHA1

    546392bf66d4bca1fb6a48064e33f98a290c4a4d

  • SHA256

    d6b08e641252b2c1e1d0d00c487a26b569c34bbed5f703f2c421f236e957ce0e

  • SHA512

    e31bea0b290181e0d4c9ff2b785fd5a3e56b38e434c8b27c41ad518edc21275ba377bdecb95508d1d42a155455a5c4f8f18f282226260119d41dc14dcb15218b

  • SSDEEP

    12288:nhxbcg9ZO2sEJAAP9pQbhZG0EsVUg70sq:vbcaZQE59p8Jfug7q

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\086496fb6fe562b586cd3abf1ca6e14a_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\086496fb6fe562b586cd3abf1ca6e14a_JaffaCakes118.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      PID:4940
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1296,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=4360 /prefetch:8
    1⤵
      PID:4200

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\620084d3a8.dl

      Filesize

      34B

      MD5

      e92d9328abcb678b34e6439d9d2d9a94

      SHA1

      cd3c53c35f3b9d29bc754575d0dede38bf50babd

      SHA256

      415424e7334c370469cf00988439c6e25433915e1828245e67fde7eda8c34b0d

      SHA512

      bb89ad09a5c1145f417d36bfe0f70b8b85556a4179c72fe2230e3fe3b9d75b7e39b08d24330d4699b700976bec2a8708b629a87a791c0b0a21db8a04a2c6a4e6

    • memory/4940-0-0x0000000000D30000-0x0000000000E83000-memory.dmp

      Filesize

      1.3MB

    • memory/4940-12-0x0000000000D30000-0x0000000000E83000-memory.dmp

      Filesize

      1.3MB