Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 17:25

General

  • Target

    f04a2e3a113ee4dcb43f1b8f54130fce_JaffaCakes118.dll

  • Size

    158KB

  • MD5

    f04a2e3a113ee4dcb43f1b8f54130fce

  • SHA1

    df172fb259cf74b98a4507e708223a6e1b4d5f36

  • SHA256

    9e355ebbac6b249350549565790d69a5e08d0a1b89ca4045d83fe27726dcee68

  • SHA512

    26cbe42c86d41e09f8147c4538351f91d00137d3f0583d903f9979d322be97f976bf725c5263eca9b83348ddc070dfc6111e5e4cde8fac856ad58484ca1db562

  • SSDEEP

    3072:RUo1ije7HSjSMOt332bbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVU7fDCrlNi:Cj2HSnQ34wvP6bQ7yMP+DE827fYlg

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 11 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\f04a2e3a113ee4dcb43f1b8f54130fce_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3560
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\f04a2e3a113ee4dcb43f1b8f54130fce_JaffaCakes118.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:4680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4680-0-0x0000000010000000-0x0000000010035000-memory.dmp

    Filesize

    212KB

  • memory/4680-1-0x0000000010019000-0x000000001001A000-memory.dmp

    Filesize

    4KB

  • memory/4680-2-0x0000000010000000-0x0000000010035000-memory.dmp

    Filesize

    212KB

  • memory/4680-3-0x0000000010000000-0x0000000010035000-memory.dmp

    Filesize

    212KB

  • memory/4680-4-0x0000000010000000-0x0000000010035000-memory.dmp

    Filesize

    212KB

  • memory/4680-5-0x0000000010000000-0x0000000010035000-memory.dmp

    Filesize

    212KB

  • memory/4680-6-0x0000000010000000-0x0000000010035000-memory.dmp

    Filesize

    212KB

  • memory/4680-25-0x0000000002280000-0x0000000002281000-memory.dmp

    Filesize

    4KB

  • memory/4680-24-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/4680-23-0x0000000002360000-0x0000000002361000-memory.dmp

    Filesize

    4KB

  • memory/4680-22-0x0000000002330000-0x0000000002331000-memory.dmp

    Filesize

    4KB

  • memory/4680-21-0x0000000002340000-0x0000000002341000-memory.dmp

    Filesize

    4KB

  • memory/4680-20-0x0000000002310000-0x0000000002311000-memory.dmp

    Filesize

    4KB

  • memory/4680-19-0x0000000002320000-0x0000000002321000-memory.dmp

    Filesize

    4KB

  • memory/4680-18-0x00000000022F0000-0x00000000022F1000-memory.dmp

    Filesize

    4KB

  • memory/4680-17-0x0000000002300000-0x0000000002301000-memory.dmp

    Filesize

    4KB

  • memory/4680-16-0x00000000022D0000-0x00000000022D1000-memory.dmp

    Filesize

    4KB

  • memory/4680-15-0x00000000022E0000-0x00000000022E1000-memory.dmp

    Filesize

    4KB

  • memory/4680-14-0x00000000022B0000-0x00000000022B1000-memory.dmp

    Filesize

    4KB

  • memory/4680-13-0x00000000022C0000-0x00000000022C1000-memory.dmp

    Filesize

    4KB

  • memory/4680-12-0x00000000022A0000-0x00000000022A1000-memory.dmp

    Filesize

    4KB

  • memory/4680-11-0x0000000002270000-0x0000000002271000-memory.dmp

    Filesize

    4KB

  • memory/4680-10-0x0000000002250000-0x0000000002251000-memory.dmp

    Filesize

    4KB

  • memory/4680-9-0x0000000002260000-0x0000000002261000-memory.dmp

    Filesize

    4KB

  • memory/4680-8-0x0000000002230000-0x0000000002231000-memory.dmp

    Filesize

    4KB

  • memory/4680-7-0x0000000002240000-0x0000000002241000-memory.dmp

    Filesize

    4KB