Analysis

  • max time kernel
    101s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 22:25

General

  • Target

    2e09d50a37744466e1799c3b5b6d0a48_JaffaCakes118.dll

  • Size

    592KB

  • MD5

    2e09d50a37744466e1799c3b5b6d0a48

  • SHA1

    14291850566b1716831fef0a7b0037ff318931bd

  • SHA256

    c66a386e38e81608d117ffa824937bda30dd769e3952d49ba1f0031732ee6f6e

  • SHA512

    0c2a06552d0d7b4cf70da677d401c88e1b72cc4a0b9460ea58548484896306cc6b97f8d886cee6fc18cd04a1c6424adaca3e520e1663efc9a10ce1476fa32b70

  • SSDEEP

    12288:6A2+8FV1enPiF3C76ee8cYruzsgpvCQPcqISL786B:1qFfX3a7uIgpvCQPoSVB

Score
7/10

Malware Config

Signatures

  • Drops startup file 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\2e09d50a37744466e1799c3b5b6d0a48_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\2e09d50a37744466e1799c3b5b6d0a48_JaffaCakes118.dll,#1
      2⤵
      • Drops startup file
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2264-0-0x0000000002030000-0x00000000020AF000-memory.dmp

    Filesize

    508KB

  • memory/2264-3-0x0000000002030000-0x00000000020AF000-memory.dmp

    Filesize

    508KB

  • memory/2264-4-0x00000000027B0000-0x00000000027C8000-memory.dmp

    Filesize

    96KB

  • memory/2264-15-0x00000000027D0000-0x00000000027F1000-memory.dmp

    Filesize

    132KB

  • memory/2264-21-0x00000000027D0000-0x00000000027F1000-memory.dmp

    Filesize

    132KB

  • memory/2264-19-0x00000000027D0000-0x00000000027F1000-memory.dmp

    Filesize

    132KB

  • memory/2264-22-0x00000000027D0000-0x00000000027F1000-memory.dmp

    Filesize

    132KB

  • memory/2264-17-0x00000000027D0000-0x00000000027F1000-memory.dmp

    Filesize

    132KB

  • memory/2264-13-0x00000000027D0000-0x00000000027F1000-memory.dmp

    Filesize

    132KB

  • memory/2264-10-0x00000000027D0000-0x00000000027F1000-memory.dmp

    Filesize

    132KB

  • memory/2264-23-0x00000000027D0000-0x00000000027F1000-memory.dmp

    Filesize

    132KB

  • memory/2264-28-0x00000000027D0000-0x00000000027F1000-memory.dmp

    Filesize

    132KB