Analysis

  • max time kernel
    147s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/07/2024, 18:31

General

  • Target

    644e5afeb8e1df7de42ba96b7ce67bbf_JaffaCakes118.dll

  • Size

    268KB

  • MD5

    644e5afeb8e1df7de42ba96b7ce67bbf

  • SHA1

    1b315d868ae07308ef62cc5bfb297dc5974f6a14

  • SHA256

    58e8efa13c292c46d250ed91bb024ed968f427b141fe76223b20dcb4c1e88d2f

  • SHA512

    55ab30c66aec480dce001b9f8f3396d56040d64111a64a7d050998956731523dbc330a86fe1dfa3bad87e836550ae1dc543b806fb53f885f33ff73086612dee0

  • SSDEEP

    6144:ZhqnIa7rYAvUa1/fjrP2IjPjAw4oAAQGzwGBrHC7glrcTx+dYJ:ZRAkAvp1/fjr+IjPjAwFAAQywoZcd+e

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\644e5afeb8e1df7de42ba96b7ce67bbf_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\644e5afeb8e1df7de42ba96b7ce67bbf_JaffaCakes118.dll,#1
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2268

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2268-3-0x0000000010000000-0x0000000010049000-memory.dmp

          Filesize

          292KB

        • memory/2268-1-0x0000000000560000-0x00000000005A0000-memory.dmp

          Filesize

          256KB

        • memory/2268-0-0x0000000000560000-0x00000000005A0000-memory.dmp

          Filesize

          256KB

        • memory/2268-12-0x0000000010000000-0x0000000010049000-memory.dmp

          Filesize

          292KB

        • memory/2268-14-0x0000000000560000-0x00000000005A0000-memory.dmp

          Filesize

          256KB

        • memory/2268-15-0x0000000000560000-0x00000000005A0000-memory.dmp

          Filesize

          256KB