Analysis

  • max time kernel
    140s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    09/07/2024, 15:13

General

  • Target

    30e3001bbbd05b5c3609550ba84e06cd_JaffaCakes118.dll

  • Size

    96KB

  • MD5

    30e3001bbbd05b5c3609550ba84e06cd

  • SHA1

    bc909b245cbb15b87de07a98ad0af6b94db7efc1

  • SHA256

    0ff17ea9b3b561a561bbec99cd7bc94b2fba7838937cadbc8e8eee44ece5edf0

  • SHA512

    b094c0d8bc1996b5a7efc3bdc6f52869413e3456620fc801e37d4c6d564473a748c492f322b5c9f43024576bfbe329ae9be68d792c114a7911f9ed307c0707c0

  • SSDEEP

    1536:o2m1AjKTFhirm31AilV5SZArwVqGGraMebsCfzKteXU8t1j1obGVzuOe16+A8ZI/:o2XjKT/Om3dV5SiwVoraMqsILBtZKb1

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer Protected Mode 1 TTPs 1 IoCs
  • Modifies Internet Explorer Protected Mode Banner 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies Internet Explorer Protected Mode
    • Modifies Internet Explorer Protected Mode Banner
    • Modifies Internet Explorer settings
    PID:1240
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\30e3001bbbd05b5c3609550ba84e06cd_JaffaCakes118.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:824

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/824-1-0x0000000180000000-0x000000018001E000-memory.dmp

          Filesize

          120KB

        • memory/824-0-0x0000000000290000-0x0000000000291000-memory.dmp

          Filesize

          4KB

        • memory/1240-3-0x0000000002A70000-0x0000000002A71000-memory.dmp

          Filesize

          4KB

        • memory/1240-2-0x0000000002A70000-0x0000000002A71000-memory.dmp

          Filesize

          4KB

        • memory/1240-7-0x0000000180000000-0x000000018001E000-memory.dmp

          Filesize

          120KB