Analysis

  • max time kernel
    96s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 18:58

General

  • Target

    f07263eae4d729e47d6876c9d5d27cd9_JaffaCakes118.dll

  • Size

    206KB

  • MD5

    f07263eae4d729e47d6876c9d5d27cd9

  • SHA1

    ea5e00c4f3098ad1023ca04117b68b7b975a9ef5

  • SHA256

    955351ebd80e2c53e6750aa180e3220ba7a8613ccac624fa7d65539612c18161

  • SHA512

    c4b590e5b0e59060ea957cc375b33d9da360c7bc7611ef587f93d91895943487c3856c185bfa7296ce970c6ba55f0fb82582d39681be55d630f3df2711a72732

  • SSDEEP

    3072:8tlVp1DQc7sis9rQ0B1ogqeq5wdrW/PYjkHyH8wmAottLvJdfgWxxiMB:8vjVQQs1v1WeqKxW/YkHTwmAY5i

Score
7/10

Malware Config

Signatures

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 45 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\f07263eae4d729e47d6876c9d5d27cd9_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3944
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\f07263eae4d729e47d6876c9d5d27cd9_JaffaCakes118.dll
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:4240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4240-0-0x0000000011000000-0x00000000110DF000-memory.dmp

    Filesize

    892KB