Analysis

  • max time kernel
    139s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-07-2024 18:04

General

  • Target

    64389e0a3e5a748c476f9e89299aa46e_JaffaCakes118.dll

  • Size

    38KB

  • MD5

    64389e0a3e5a748c476f9e89299aa46e

  • SHA1

    0a2adcf3ab84cedf22bd0cc39bc947d0a83b35f1

  • SHA256

    ef430ec1b0c110f9754daf8af2f992e66dff2fc45eebe7b62b7e74d885e39a5f

  • SHA512

    1cb9e91ffbe086e09344c65479a11e3738a332051c28bfd801fd55a1898364c1e096504f0192247d44db569056cc3b0d8f251925148144a8ab39fb137142b3d2

  • SSDEEP

    768:hAl0sxmt3XMVhjinTKoL5MxQoMNzTKbWUeB0:hnjt38Vh2TKq5ClMNzTrUeB0

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\64389e0a3e5a748c476f9e89299aa46e_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1816
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\64389e0a3e5a748c476f9e89299aa46e_JaffaCakes118.dll,#1
      2⤵
      • Adds policy Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      PID:1364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads