Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2024, 07:51

General

  • Target

    252d085e77cf49047da542eb5c82e287_JaffaCakes118.dll

  • Size

    15KB

  • MD5

    252d085e77cf49047da542eb5c82e287

  • SHA1

    93d10e8930dfd6b7233795f88867c08799974771

  • SHA256

    f2420f3814a89e21423a63a964a69fdd77105b8a942ccdfa1587f18c12ba1bf4

  • SHA512

    3dd74405ab5e0dc35cee997d748f7c78b1d73fe4ced15736009442959fd403c94ec888aaf5bab9fd1039247871d510967f096f09892f1bc0101bacba9bac560d

  • SSDEEP

    192:fHQPdb92+DpUun7gTjC4QOBzKboivhK4hmSdHyX4S2HW1pizo9+n4:PkTU87gTjC4QSwKAykW1Qzo9+4

Score
1/10

Malware Config

Signatures

  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3512
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\252d085e77cf49047da542eb5c82e287_JaffaCakes118.dll,#1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4044
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\Temp\252d085e77cf49047da542eb5c82e287_JaffaCakes118.dll,#1
          3⤵
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:3708

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3708-0-0x0000000010000000-0x0000000010007000-memory.dmp

            Filesize

            28KB