Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 22:25

General

  • Target

    c1b7771611f43eadb49e955f77906cc9_JaffaCakes118.dll

  • Size

    268KB

  • MD5

    c1b7771611f43eadb49e955f77906cc9

  • SHA1

    ebf4376c6930c3cc3dbbb164444142856ec4f426

  • SHA256

    45c750b7a13560468da319b4e30fdd0d9dc74c6fb9c66ede9a260018e0e25be9

  • SHA512

    24ead298a4d8dc1ce35b420ca0af4fdb1d1b1d01e0c1089d12eed21a8c0e7a492d6b00a2029b9db8d621333ea846f4d07e808337f1b4e93c4550ee89b37ce283

  • SSDEEP

    6144:XIRKRKqa/hQ88Q/dD4YzD9/x6zst/QhNM:XQKjaT8Q/dcUT6zM

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\c1b7771611f43eadb49e955f77906cc9_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\c1b7771611f43eadb49e955f77906cc9_JaffaCakes118.dll,#1
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1824-0-0x0000000002890000-0x0000000002990000-memory.dmp

    Filesize

    1024KB

  • memory/1824-1-0x0000000010000000-0x0000000010049000-memory.dmp

    Filesize

    292KB

  • memory/1824-11-0x0000000010000000-0x0000000010049000-memory.dmp

    Filesize

    292KB

  • memory/1824-12-0x0000000002890000-0x0000000002990000-memory.dmp

    Filesize

    1024KB