Analysis

  • max time kernel
    140s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27/06/2024, 11:34

General

  • Target

    15da120bcd77742e8dae9c5d174e1f50_JaffaCakes118.dll

  • Size

    51KB

  • MD5

    15da120bcd77742e8dae9c5d174e1f50

  • SHA1

    dd762026507989908164141d9999d5c1a3f9ef05

  • SHA256

    92feb0c80f3ac89efdf5f9acc245e9be6fcde6c417ce9563fcb478d44bc1e859

  • SHA512

    2cb7c93933e325b05721a15e89f8f8052de2ed7e4273804d8cb054ec431d2c42dec27fc7f2a43b4285c0c9b487b938602e4e07c90615f211561528b6322130cf

  • SSDEEP

    1536:0z75sbC0zmZtQmVkdUILSmYM7XNaKuf+c+ZGNFeqwI8Ic:0z6C0zytgNB7oKAGlqA

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\15da120bcd77742e8dae9c5d174e1f50_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\15da120bcd77742e8dae9c5d174e1f50_JaffaCakes118.dll,#1
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe "C:\Users\Admin\AppData\Local\Temp\15da120bcd77742e8dae9c5d174e1f50_JaffaCakes118.dll",iep
        3⤵
          PID:2724

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1712-0-0x0000000010000000-0x0000000010010000-memory.dmp

      Filesize

      64KB

    • memory/1712-2-0x00000000002F0000-0x0000000000330000-memory.dmp

      Filesize

      256KB

    • memory/1712-1-0x00000000002F0000-0x0000000000330000-memory.dmp

      Filesize

      256KB

    • memory/1712-3-0x0000000010000000-0x0000000010010000-memory.dmp

      Filesize

      64KB

    • memory/1712-5-0x00000000002F0000-0x0000000000330000-memory.dmp

      Filesize

      256KB

    • memory/1712-6-0x00000000002F0000-0x0000000000330000-memory.dmp

      Filesize

      256KB

    • memory/1712-8-0x0000000010000000-0x0000000010010000-memory.dmp

      Filesize

      64KB

    • memory/1712-11-0x0000000010000000-0x0000000010010000-memory.dmp

      Filesize

      64KB

    • memory/2724-10-0x00000000026C0000-0x0000000002700000-memory.dmp

      Filesize

      256KB

    • memory/2724-9-0x00000000026C0000-0x0000000002700000-memory.dmp

      Filesize

      256KB

    • memory/2724-12-0x0000000010000000-0x0000000010010000-memory.dmp

      Filesize

      64KB

    • memory/2724-15-0x00000000026C0000-0x0000000002700000-memory.dmp

      Filesize

      256KB