Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 20:47

General

  • Target

    36512a1d5d2831bc2bb7a9f0e6da97e0_JaffaCakes118.dll

  • Size

    216KB

  • MD5

    36512a1d5d2831bc2bb7a9f0e6da97e0

  • SHA1

    8bb6227afb0a43bf87311251cb45d799de805a11

  • SHA256

    2b505a20c71c8d1f44fcec98e6b3dd17d0b1ce8a210ecd01e717439ef40cdb1f

  • SHA512

    68a578aac73de95f27610ec3db7a235ee871722257971e58da77abf8663821b681c27715f9ca375e000674f63bf6daf329637601ae9e9bccf37bc3f26a6b9e7f

  • SSDEEP

    3072:e97heKcmDyta4NNkPzPtHkSRUxvZVv0GXMt9q7+Tvih3uVlRPJkzLpt2OY/:2FD14NiPzPhRSvZVpXZjwlRPqqr/

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 56 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\36512a1d5d2831bc2bb7a9f0e6da97e0_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\36512a1d5d2831bc2bb7a9f0e6da97e0_JaffaCakes118.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads