Analysis

  • max time kernel
    119s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    15-04-2024 16:29

General

  • Target

    f17df1907ec37429d08fe4147cf64e0d_JaffaCakes118.dll

  • Size

    9KB

  • MD5

    f17df1907ec37429d08fe4147cf64e0d

  • SHA1

    cc851f716d3eff03987c1058f4de0087c177575f

  • SHA256

    afc646d02072d606db9479d82ceabec473de2d41607ef86452260977e9928a05

  • SHA512

    8b12f9f4590c28234902d166a69f6ac13080577e7be5b08beb491337c60eb7e226644176adea4918185caf15ef7a52a842b3d687f6f4ad52d2ee245004535688

  • SSDEEP

    192:YfTg0kDHcKauBwWA9WCCNfUoa4P5TfOP:YLIDHcKaaCCJ1a4xTfO

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\f17df1907ec37429d08fe4147cf64e0d_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\f17df1907ec37429d08fe4147cf64e0d_JaffaCakes118.dll
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2224

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2224-0-0x0000000010000000-0x0000000010009000-memory.dmp

    Filesize

    36KB

  • memory/2224-1-0x0000000010000000-0x0000000010009000-memory.dmp

    Filesize

    36KB