Analysis

  • max time kernel
    13s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    19-07-2024 23:57

General

  • Target

    5e3ae42a1b148c3f1f939957c22bdd97_JaffaCakes118.dll

  • Size

    220KB

  • MD5

    5e3ae42a1b148c3f1f939957c22bdd97

  • SHA1

    f5c7b9109b710d45bc1d3f49a195b2e9fb2d5ecf

  • SHA256

    592ad8f762a9456c35092f9ba8efb308f2720579f7aa5c2fd8c2d8aa8a284468

  • SHA512

    595a81e214a0edc8ba765336ed56852b44956a10a0ef8d686ca02c6c57f05c25aaee11522896c714d3f2c4e72dcc01deb60212ec0b36fe2a9cced61e502861fc

  • SSDEEP

    3072:HtpPHZQtckqwyznOKGEWnifIZYJQZkpR6hIkMtT/FgqdZQFmg5+2vQbe:Np2txyz/GHi6BZkpSMtRhwFTbvQbe

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Modifies registry class 39 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\5e3ae42a1b148c3f1f939957c22bdd97_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\5e3ae42a1b148c3f1f939957c22bdd97_JaffaCakes118.dll
      2⤵
      • Drops file in Drivers directory
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2160
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe C:\PROGRA~2\3721\helper.dll,Rundll32
        3⤵
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        PID:2936

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~2\3721\helper.dll

    Filesize

    44KB

    MD5

    025d30ec1875510defb35706699db2fc

    SHA1

    ebdadbf85db72b28b41e1b6f90e6a28fa5f92a7c

    SHA256

    dcd7f2861bc42728ce18a0397717f4853f28a7cb1139c43ef2ad34a5c605dfef

    SHA512

    96c9025abb7a1121b28be31b18b63a06fecbe5f769da8e69e507570bdbe55c1dd75653d0b0ff70e86798bbc2f78e4ac392cde4579fca0f71a29c689c7a2f9f88

  • \PROGRA~2\3721\autolive.dll

    Filesize

    220KB

    MD5

    5e3ae42a1b148c3f1f939957c22bdd97

    SHA1

    f5c7b9109b710d45bc1d3f49a195b2e9fb2d5ecf

    SHA256

    592ad8f762a9456c35092f9ba8efb308f2720579f7aa5c2fd8c2d8aa8a284468

    SHA512

    595a81e214a0edc8ba765336ed56852b44956a10a0ef8d686ca02c6c57f05c25aaee11522896c714d3f2c4e72dcc01deb60212ec0b36fe2a9cced61e502861fc

  • memory/2160-15-0x0000000000210000-0x0000000000249000-memory.dmp

    Filesize

    228KB