Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 02:31

General

  • Target

    375e79c89b009d281e5e98e817930fa7_JaffaCakes118.dll

  • Size

    63KB

  • MD5

    375e79c89b009d281e5e98e817930fa7

  • SHA1

    0f1c3ed5a3e090eb73c9ce182149dd95f7d80dcf

  • SHA256

    213bf44f481f5796f3a2549132f408998efd92a051f82cd330612b59c2aa33d9

  • SHA512

    685d9db6baf8b8629e347734c4e55127678bd3fa39981818e7c731622472ce9b818da3941e27b5aea87aed21960c615595dffb03bb195b5a73bbb8fb49c43902

  • SSDEEP

    768:nHpI5EBmwLXHN6RRHHdB+BmHY97o014/89GH4X6Mgd90YQFO6ZXsSKhAUlxSoL3:nJIMlt6RRdOm214/hVh4KhHnZr

Score
7/10

Malware Config

Signatures

  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\375e79c89b009d281e5e98e817930fa7_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\375e79c89b009d281e5e98e817930fa7_JaffaCakes118.dll,#1
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:1640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1640-1-0x0000000010000000-0x000000001002B000-memory.dmp

    Filesize

    172KB

  • memory/1640-2-0x0000000010000000-0x000000001002B000-memory.dmp

    Filesize

    172KB

  • memory/1640-0-0x0000000010000000-0x000000001002B000-memory.dmp

    Filesize

    172KB