Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/07/2024, 19:48

General

  • Target

    238bebdbc62a0885aa810c6e177f8af8_JaffaCakes118.dll

  • Size

    224KB

  • MD5

    238bebdbc62a0885aa810c6e177f8af8

  • SHA1

    863a73bafd5e7e91de9a94856c7ace6a048a99b9

  • SHA256

    af543b47dae96a231c5c6e45f48f2704d1dbd976d6cc7bfc77b535ebd44cc701

  • SHA512

    8a167e7e89c8380b8d1d4a60ed81ccc3a191a231a884be20b726ec7e1e92020189c629b77e7a0627367fcbc95ea0e170fa4b0a1c018d190f9bfddb226e4b95e3

  • SSDEEP

    3072:fz1uZZZp0x4CYxLiDrBNkciSNPJcEUnrG7xpxemg04GZwDfsfCcitrqCwC+:f4PxLm/2HrWpTkgcm

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\238bebdbc62a0885aa810c6e177f8af8_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4828
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\238bebdbc62a0885aa810c6e177f8af8_JaffaCakes118.dll,#1
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Modifies registry class
      PID:1464

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads