Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/07/2024, 11:52

General

  • Target

    390029121772a48c7a0897d36507c6b9_JaffaCakes118.dll

  • Size

    116KB

  • MD5

    390029121772a48c7a0897d36507c6b9

  • SHA1

    e42384aef3a1a7c277c25e3378002d4743135532

  • SHA256

    9416d1a63fb0838a5731cb00f28675b72ae12dc3e60e94a2d8c3e05edc8f8788

  • SHA512

    973228afaef002fca86b037558af8aef752158f0606c29a5d9d1710aa5e9e501d41a64853597039e557eebbb9fec12215e05784c01bc05da7c16dd859ff5c76e

  • SSDEEP

    3072:dOaKhJBck9q0j65u0xzx2Ec2kc8+QxyqWbsi3+LBeU4:IhJBcKdj70hIUkcExyqQsveU

Score
6/10

Malware Config

Signatures

  • Modifies WinLogon 2 TTPs 7 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\390029121772a48c7a0897d36507c6b9_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\390029121772a48c7a0897d36507c6b9_JaffaCakes118.dll,#1
      2⤵
      • Modifies WinLogon
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      PID:2468

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads