Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 06:38

General

  • Target

    6a992f3ae464ba3b2340626ffc07451b_JaffaCakes118.dll

  • Size

    248KB

  • MD5

    6a992f3ae464ba3b2340626ffc07451b

  • SHA1

    a5ac5e0ca6e6fef270b63258adebff8440ac76a2

  • SHA256

    ad2274e0033933689bd20bbf7fa79d27378a7922648c1b00c305292ef98e6c65

  • SHA512

    c8b9dc2c60699d4a107be8cf197a4c6f25c5dd20474a3be083ecb0e090c32c3e52384ff036225bf7fa8b9facb3c51fdf7e0715060cb0b51a4426958121ba7396

  • SSDEEP

    3072:ZLVqujzHfA8cueo8s7mVpI4lqwDO8axoU4Kzy+IMHYFZ4BYtTK5l:ZLnM8kzaaKzdde

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6a992f3ae464ba3b2340626ffc07451b_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6a992f3ae464ba3b2340626ffc07451b_JaffaCakes118.dll,#1
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads