Analysis

  • max time kernel
    127s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 15:12

General

  • Target

    5c7b68a25c9dede6094afa67a546b61e_JaffaCakes118.dll

  • Size

    126KB

  • MD5

    5c7b68a25c9dede6094afa67a546b61e

  • SHA1

    7b958c0e3f7ed024fe3d9a2ec5e758d1e04e65b7

  • SHA256

    e27294adc382304874ab3cb782639b9eb668f9065a6fd862c9e8019f4e409a6c

  • SHA512

    e0d3028a769024438239848ce8d06844847896248318353be7421158a0be74ec89a26fc330528e2e0047205da29f9b902e2caa44658296b557e1684cdf7e011d

  • SSDEEP

    3072:RS5WU1bUMSEd61GND6AZOHQ9Xx3zirk7iwGPy6g+mSRd:RALb1682ACQ9Rzir31y6fmA

Score
7/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Installs/modifies Browser Helper Object 2 TTPs 2 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Modifies registry class 27 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\5c7b68a25c9dede6094afa67a546b61e_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\5c7b68a25c9dede6094afa67a546b61e_JaffaCakes118.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • Modifies registry class
      PID:4868

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4868-0-0x0000000010000000-0x0000000010061000-memory.dmp

          Filesize

          388KB