Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    03-07-2024 23:59

General

  • Target

    23ee4d613e859915f10f80af37bacfd9_JaffaCakes118.dll

  • Size

    14KB

  • MD5

    23ee4d613e859915f10f80af37bacfd9

  • SHA1

    49a41be46181b3c32f66aded5895d02a90c03500

  • SHA256

    d591b79c4c9c2548dee90255483b53198bdaafb1e772a4fd3e686f703bb21562

  • SHA512

    ea1456a3ed5ba0d9a28cffc93307ba1ba4eb49c5ee1b92a62dbda2f148db1b66c92960e7edda3ac36150935c44b558b2ab93e8faba37bd6293aa0ab7950c6c6c

  • SSDEEP

    192:0PRjseE6IrFeOPbhev2Vid4XTW9yHD4SyLoYDudiiAvzh/n0:wftIrhbho2VM924Sm3udii6t

Score
1/10

Malware Config

Signatures

  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1364
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\23ee4d613e859915f10f80af37bacfd9_JaffaCakes118.dll,#1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2388
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\Temp\23ee4d613e859915f10f80af37bacfd9_JaffaCakes118.dll,#1
          3⤵
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2400

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1364-0-0x0000000002A50000-0x0000000002A51000-memory.dmp

      Filesize

      4KB

    • memory/2400-2-0x0000000010001000-0x0000000010002000-memory.dmp

      Filesize

      4KB

    • memory/2400-1-0x0000000010000000-0x0000000010006000-memory.dmp

      Filesize

      24KB