Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2024, 14:08

General

  • Target

    ff736aab5a06b23896b0963b7623b297_JaffaCakes118.dll

  • Size

    587KB

  • MD5

    ff736aab5a06b23896b0963b7623b297

  • SHA1

    057eeaed4d25ec32cf3d7e49e3fd3ef052bea182

  • SHA256

    6399245c51f9d967b66b2ce351daf5206f2d22be1054caa95d0286ab091dcec6

  • SHA512

    9647776cb5b8bd62684e1749d938c9aaee1aba4ca4cebecb4d593ca625bee480619419b67c6cc9db71f1d1895190a2b2aae12547b54962862cd6779c984f6fed

  • SSDEEP

    6144:nWp8QVdQxTEZsEcTUOVPCXPMWbrKkZqUKsuGQ9oVIlHInVHNwK7/m//thn4MRfg:1xTMsEcahKkVuoVl9rUVLR

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Sets service image path in registry 2 TTPs 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ff736aab5a06b23896b0963b7623b297_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ff736aab5a06b23896b0963b7623b297_JaffaCakes118.dll,#1
      2⤵
      • Drops file in Drivers directory
      • Sets service image path in registry
      • Suspicious use of WriteProcessMemory
      PID:1548
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 /s C:\Users\Admin\AppData\Local\Temp\34BC.tmp
        3⤵
        • Loads dropped DLL
        PID:5016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\34BC.tmp

    Filesize

    466KB

    MD5

    21e645cf1fb09ce41698280eae2e2ebd

    SHA1

    f75097f133652c076e5fc49f72493ea7d2aa6768

    SHA256

    f9ab1db19c0a5393b0b81c8eaa5e8338c58b4fd7f21805ca151b4801d708becd

    SHA512

    433973efbc29e55ae4972045113685430eafb382045a7c77c5d883cfb55bcc0745969afbd2291d6c66b0a5d630ee84d1d0ab2f5b17d2fe48f95b42f18402fedf

  • memory/1548-0-0x0000000002CE0000-0x0000000002D70000-memory.dmp

    Filesize

    576KB

  • memory/1548-3-0x0000000010000000-0x000000001008F000-memory.dmp

    Filesize

    572KB

  • memory/1548-21-0x0000000002CE0000-0x0000000002D70000-memory.dmp

    Filesize

    576KB

  • memory/5016-7-0x0000000002A10000-0x0000000002A79000-memory.dmp

    Filesize

    420KB

  • memory/5016-10-0x0000000010000000-0x0000000010068000-memory.dmp

    Filesize

    416KB