Analysis

  • max time kernel
    132s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    27-06-2024 16:42

General

  • Target

    16bb0f9d98eb7a832b6db1e92f4e4f1a_JaffaCakes118.dll

  • Size

    122KB

  • MD5

    16bb0f9d98eb7a832b6db1e92f4e4f1a

  • SHA1

    cce5b3a2965c500de8fa75e1429b8be5aa744e14

  • SHA256

    ddce4b5e1c03d04bb82780a2d0f08469bb589b6fe8f0d4cc2a140b16344f5bd1

  • SHA512

    daa08562b0d06c495c9a846c270e30d51fec7694a875571313ad60f88d9327557aac7180cb562f10d8cd193da17c59d2b0962d6f25355bb4e973f66f1abb7209

  • SSDEEP

    3072:IkWt6R1r+akw0yzBbZlVQ00QjDdjTZ6T:IJ6R1awBb/i0bHVTZ6

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\16bb0f9d98eb7a832b6db1e92f4e4f1a_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\16bb0f9d98eb7a832b6db1e92f4e4f1a_JaffaCakes118.dll,#1
      2⤵
      • Blocklisted process makes network request
      PID:2080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Assistance\Client\1.0\E052.tmp

    Filesize

    2KB

    MD5

    8e7905157bd46d94dfbe9e6b318b15e9

    SHA1

    f436ff36b9d03d5384161ad609bac104bd9b7c99

    SHA256

    ca41d3d1d2a056d4ae842024688077097ecccd12e6c7c76aaea9ad638b5f0214

    SHA512

    694161815f3c59f4484d3199f3a8a87d145afcad2671b996d675f29a539ce8ac0f800a6d47893d9f8dfbbf03f2dc23628409f6118511eff633def42ac441c302