Analysis

  • max time kernel
    140s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 09:51

General

  • Target

    07cdf5badc01c381c51bd4ae4be96f52_JaffaCakes118.dll

  • Size

    833KB

  • MD5

    07cdf5badc01c381c51bd4ae4be96f52

  • SHA1

    6de04a9b12568245ed97963db348b931f75ec484

  • SHA256

    d082049f2b4414194284f8ea89e2042848d3637f6829b6616db06c8dde1a3756

  • SHA512

    bd95bdcd0665bc67deda25d5f3878bc05f8b3c4a414736ba2783aef6935afde10f4d7e6b95d8a8eaf79c4daa14f920c6a66edf2835b85aa9ac7673011050ebe0

  • SSDEEP

    12288:7I5VuzMSiaNF0SfVfZZl//DkfB1ukHsOaqVgQvzBA0CXoDOzW5PV:cn4bN0S/3K1VaqVhzSZ4DOzq9

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\07cdf5badc01c381c51bd4ae4be96f52_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\07cdf5badc01c381c51bd4ae4be96f52_JaffaCakes118.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • Suspicious behavior: RenamesItself
      PID:1456

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\7e2383a2f3.dl

          Filesize

          22B

          MD5

          5c1250ac3f7af849c8cdb2337d89f108

          SHA1

          a709685b18c693671e999183c97bcebf4094bce0

          SHA256

          164525709efa5d6f11e292ba8f575fadb84c024db356621fc94acafc9067b22f

          SHA512

          aa8f5e109b1505cf38afab6cab618d200222b54b2cda091a0f3d1963a0a1130fe36346bdffdb20b378dfca07610aaf9e78238fb3efa86a794a86fe3f0abd381a

        • memory/1456-0-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB

        • memory/1456-21-0x0000000000400000-0x00000000004D8000-memory.dmp

          Filesize

          864KB