Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/07/2024, 10:53

General

  • Target

    28499159f535dabf9ea083af93565ff0_JaffaCakes118.dll

  • Size

    46KB

  • MD5

    28499159f535dabf9ea083af93565ff0

  • SHA1

    2d208a564ac9fdf414cbf7b6719c79cd2ffa3f17

  • SHA256

    fb9fca4614485b599c5fd80123f43edbdca84110a1fa3a1f07e8e9899949ec7b

  • SHA512

    3199011c2c225ed134f4afe1b3887f33a683cb01903a5b21e484577bac0c92eed32a4ecd4da3eb0345ad3118bf56bf62ef5c56bc845b114ec17c48754fdacc75

  • SSDEEP

    768:+cTXETzeHVYbmiNZOv24DFqGGaA3wyhW01O5z4F3REsIlHIJHdR4xkgzWjfL:hETQqbTCTD4GGaA3waDisFhEHlGHEzW

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\28499159f535dabf9ea083af93565ff0_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\28499159f535dabf9ea083af93565ff0_JaffaCakes118.dll,#1
      2⤵
      • Modifies firewall policy service
      • Windows security bypass
      • Windows security modification
      • Adds Run key to start application
      PID:4204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads