Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2024 12:49

General

  • Target

    e037eb5a4c6a0ea07f07896138c0b588_JaffaCakes118.dll

  • Size

    840KB

  • MD5

    e037eb5a4c6a0ea07f07896138c0b588

  • SHA1

    4f8bf7e873780ff819a61a6328cb904d6c23e33b

  • SHA256

    28e0294d28e5ee14afb3531d0678ee40ec682e39c6574ac71ebe12514123a65c

  • SHA512

    2694b7874f873d5ffe03e7c57e9078f47a660afb445516b341896a1e7fa4eb6dd4f73d9046d7a71f6bea6cfdad19ebd4d07599bb338a53d883479acb4d28313b

  • SSDEEP

    24576:9KU6GmyoRYWILtjRi0x5ll0nwZwzSuy0j2jt:Y9/IL3i0x5snwZwzSJ0jW

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e037eb5a4c6a0ea07f07896138c0b588_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e037eb5a4c6a0ea07f07896138c0b588_JaffaCakes118.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of SetWindowsHookEx
      PID:2688

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\d65f64d341.dl

    Filesize

    22B

    MD5

    62fb3e8688fe76a7c00fdddc2b3a206a

    SHA1

    fe67716d47d15bca0b9542200cd71c94b17ac396

    SHA256

    4ef4eb4ff9f1667b5db9ac9389a400f4be3f609e927ce144487c1fcd03ab8f59

    SHA512

    1b06b9044527137cffdba0583facb5f238e00edb114c27a1e16bb4f33f9fb743cc2b697cf8ae29d2e34e1ee194c72746c4057edf16cd1950d7fb2a20fc1ce983

  • memory/2688-0-0x0000000002230000-0x000000000247E000-memory.dmp

    Filesize

    2.3MB

  • memory/2688-21-0x0000000002230000-0x000000000247E000-memory.dmp

    Filesize

    2.3MB

  • memory/2688-22-0x0000000002230000-0x000000000247E000-memory.dmp

    Filesize

    2.3MB