Analysis

  • max time kernel
    94s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 23:17

General

  • Target

    ee9f5d6f39353e707c128272b59da80d_JaffaCakes118.dll

  • Size

    220KB

  • MD5

    ee9f5d6f39353e707c128272b59da80d

  • SHA1

    90d3ff59be570c5350d4b32bf7f516cae0b4b696

  • SHA256

    d6ae90b2690294dc8a8555c748569c87cb59143eff1d4727159822c0f76f59e4

  • SHA512

    5d25f2b94a4c798f25c432394ed6d7eab860c4d5e65aa48ce7bf4b444b5a76f862dbbbb499e3c64a9509cd5f4969c8c1962157ea16fba1c92a161885c749ae94

  • SSDEEP

    3072:ttgMY+QAYUV5ykUShns67RpbspT8P9PrgLe7BYtK25lBBDS/:tYiXrns6tpbDdN9/y1g

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ee9f5d6f39353e707c128272b59da80d_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3772
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ee9f5d6f39353e707c128272b59da80d_JaffaCakes118.dll,#1
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:4188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads