Analysis

  • max time kernel
    107s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-09-2024 16:20

General

  • Target

    fcaf497164b5d91cbe6c1fafbaba243e_JaffaCakes118.dll

  • Size

    142KB

  • MD5

    fcaf497164b5d91cbe6c1fafbaba243e

  • SHA1

    23a798d8717ee3d31749976e973676156a05f528

  • SHA256

    138172ff03949546f9b119a5620aa06f7e5e64e3e96b226e9c5a68c4ed3705a1

  • SHA512

    29145b118d47b30fc71d6ef987f5c644dcb0ef070ad995c084804abdc62562bb731f200d253b0911487eaf12869814dedb5c3f4f97577ab3a49dd79a49ce35e1

  • SSDEEP

    3072:HsKSXo+5UNSxl+hkeyt4dIyQyuiASTK6wJj:kb5XxQhJpcErw

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 3 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 34 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\fcaf497164b5d91cbe6c1fafbaba243e_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:916
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\fcaf497164b5d91cbe6c1fafbaba243e_JaffaCakes118.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads