Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 07:22

General

  • Target

    27b5f7d82827c48dc7f01b8c5f9f1a05_JaffaCakes118.dll

  • Size

    44KB

  • MD5

    27b5f7d82827c48dc7f01b8c5f9f1a05

  • SHA1

    b7d79655cd447c2ac858122d2fec596cd09dffa5

  • SHA256

    1c8f8dd4c6c711728a8a904dbed45c2feacc389024a1470d7655ddd93ea6120e

  • SHA512

    3c7b06957f12059e0053a753fe2fd14a12e67fe15cdba9aed0937d1e89c883cc7587b8b72e886872111a72674baa6a5c008d941016f334132da6f07d0f9aa446

  • SSDEEP

    768:DR4D1eASZCzF3MLbYS3B1Tjje0DocyGMyDkomZ8tzDHYptwxfDg6rZooNb1g7DCk:mD1eAJMvY0jL7DzXMyDl44YptuFu35Ds

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\27b5f7d82827c48dc7f01b8c5f9f1a05_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1820
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\27b5f7d82827c48dc7f01b8c5f9f1a05_JaffaCakes118.dll
      2⤵
      • Drops file in Windows directory
      • Modifies registry class
      PID:4280

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads