Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 02:35

General

  • Target

    847f2497711d822e3a5623a9a54602e8_JaffaCakes118.dll

  • Size

    264KB

  • MD5

    847f2497711d822e3a5623a9a54602e8

  • SHA1

    12ebebe904cfa310b63bf4d7b7b7f63be6ec11a8

  • SHA256

    1927c89fb690b1c22eeec163e95cd376e3a3c02263c98ea135f07e9b10f41185

  • SHA512

    aedaf76ae022689afdb7097b10e63c6b246ff619c822d4a4ed67eaad8b3fb7b3c6936e79b74fbb6431bfa0f9bdfe6d830997be6e2f2e24acd52668c6d9370e35

  • SSDEEP

    3072:5ZDfFSrVjtSgqZf6llWpzkEya2mWzqECPYzulx++SnFn54vvjD+8qvPPECX3udzZ:E1lWZem2bCAzl96vnHlSKd

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\847f2497711d822e3a5623a9a54602e8_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\847f2497711d822e3a5623a9a54602e8_JaffaCakes118.dll,#1
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2120

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads