Analysis

  • max time kernel
    94s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2024, 13:16

General

  • Target

    efe03ef322a696ae3353a0fe4d483b53_JaffaCakes118.dll

  • Size

    268KB

  • MD5

    efe03ef322a696ae3353a0fe4d483b53

  • SHA1

    c5dbdd5d352a14b27dcf5c2b392f8235bac916b0

  • SHA256

    1d3fe70fecc24d81e6b8edb37e6b1c484915e8e253530aa164fecf4bfef433d1

  • SHA512

    bdeefc31421d554ddb084bc5d3def75e95d37dd25ef88b6482dfe30d14d71649d36b54595acaad5c12849349c51e3776c0faea6ceb457f1c6c8637935d29a96e

  • SSDEEP

    6144:ctTnMoi2Qomq2O44Vl+tING5rQm4RAbTfmFxO5uDgNLmV1U:ctTnbi2NdX44VlmlQ6TmTO5uDMG1

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 11 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\efe03ef322a696ae3353a0fe4d483b53_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3684
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\efe03ef322a696ae3353a0fe4d483b53_JaffaCakes118.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:3432

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3432-0-0x0000000000400000-0x00000000004B0000-memory.dmp

          Filesize

          704KB