Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-04-2024 08:04

General

  • Target

    fc4ccb5a5283b713af4e609582a2e495_JaffaCakes118.dll

  • Size

    336KB

  • MD5

    fc4ccb5a5283b713af4e609582a2e495

  • SHA1

    833c1be89ddf0004458fe9c450a5868eb9218ee9

  • SHA256

    b1ae193f01e0f33d556173f1ecc00b98a966c5b8986093f2eca0b3e338984a2b

  • SHA512

    342a1a54a1ccc5fda7b81e2b2cebeb92e7894e1fb290014c1dc48df22c69c9c7c798fd4d64dbe7d36ed1a7d25360d162c57e02af36f48fad06b9228b1a9f4f3e

  • SSDEEP

    6144:zTBsFSYLie4lXFTzJQ5/fe8oPmomce4diTOt:zTBWSuBsTzK5/G8oPmomcPi

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fc4ccb5a5283b713af4e609582a2e495_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fc4ccb5a5283b713af4e609582a2e495_JaffaCakes118.dll,#1
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Modifies registry class
      PID:1580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads