Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/07/2024, 17:45

General

  • Target

    42b3c8131093a75daa9bcc0306c203fd_JaffaCakes118.dll

  • Size

    232KB

  • MD5

    42b3c8131093a75daa9bcc0306c203fd

  • SHA1

    ebe270da9b22c04ebe7fd1130666d18a9bb4130a

  • SHA256

    ac5bed1a68e2642fe240875cceba0818d6fb07a9ee59e8ae215e570b56f114c1

  • SHA512

    672eebefa52760b318d41cd26c98ccb2ca442205626ba2bb32580d22858ef0914ceccdf95ae843a12080bbdbccc27676c00beefce732af7cf9e825f7ba7dbe20

  • SSDEEP

    3072:RU6tpX9FcKEDHX35bfBNwrB+N1YpzkFnPyrKIumsY+sRLGxSTWdJn5nRtNyoMfq6:zPVRKIuk1GxFdJn5nR3efqEr3

Score
6/10

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 15 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\42b3c8131093a75daa9bcc0306c203fd_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\42b3c8131093a75daa9bcc0306c203fd_JaffaCakes118.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:3460

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads