Analysis

  • max time kernel
    142s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/04/2024, 16:17

General

  • Target

    ea66638b0882331e815fce08ced11a2b_JaffaCakes118.dll

  • Size

    51KB

  • MD5

    ea66638b0882331e815fce08ced11a2b

  • SHA1

    6839dd1c4cd7d8d511dd17c247ed59113e52227a

  • SHA256

    8eb4ecdca62481bf94e00ddb02fef2250c5cdb36d2b4d582d6189d7fd013b269

  • SHA512

    eea51566ecf94e12a55fcc5e117059434deced346c7338fad4255a881232864d06749d5a4c6f0b8d13fcb5c35b3bba4c27fe2e4f47306bf7cfccadffbf601462

  • SSDEEP

    1536:zn4XHl9UoX63ZyR3U8SEt8s4OvNzpEr1b:7OlyJIsEt8ivN1+

Score
4/10

Malware Config

Signatures

  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ea66638b0882331e815fce08ced11a2b_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ea66638b0882331e815fce08ced11a2b_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Program Files directory
      • Suspicious use of SetWindowsHookEx
      PID:4328

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4328-0-0x00000000009C0000-0x00000000009E6000-memory.dmp

          Filesize

          152KB

        • memory/4328-1-0x00000000009C0000-0x00000000009E6000-memory.dmp

          Filesize

          152KB

        • memory/4328-2-0x00000000009C0000-0x00000000009E6000-memory.dmp

          Filesize

          152KB