Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 04:11 UTC

General

  • Target

    045230492f8f748cef472af9fea02332_JaffaCakes118.dll

  • Size

    230KB

  • MD5

    045230492f8f748cef472af9fea02332

  • SHA1

    66f7c15a0ff1098144cad0680774d48a8d7c25f9

  • SHA256

    68b74b57175e5052f1f04085c3ff32e5ee0163cd7b81ea3371612e80fefb4972

  • SHA512

    bfc070842c965ee8be620281bdaeddc9b289382bfa2c215b33ab85f2d26353a125981a84d12be097437f358632177faeb69e2fd875ba46fe8c662233492834df

  • SSDEEP

    1536:rlX3piGV13fYn/yF73wVComfIwIZqkbhwaQVTfOW0lsEr+5gL/lG8G8wik5ii:JN13gnOZIwNo4fO7rMgbNwik5J

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\045230492f8f748cef472af9fea02332_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1648
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\045230492f8f748cef472af9fea02332_JaffaCakes118.dll,#1
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\lllmo.dll

    Filesize

    1.1MB

    MD5

    9b98d47916ead4f69ef51b56b0c2323c

    SHA1

    290a80b4ded0efc0fd00816f373fcea81a521330

    SHA256

    96e0ae104c9662d0d20fdf59844c2d18334e5847b6c4fc7f8ce4b3b87f39887b

    SHA512

    68b67021f228d8d71df4deb0b6388558b2f935a6aa466a12199cd37ada47ee588ea407b278d190d3a498b0ef3f5f1a2573a469b7ea5561ab2e7055c45565fe94

  • \Windows\SysWOW64\zzzac.dll

    Filesize

    625KB

    MD5

    95e2376b3323f062eb562b8586d0f14a

    SHA1

    453d4c3bf4a489433b593420a37bbffb7749875a

    SHA256

    bd3fa8750123d00aa0967fba44372c46ea002681da9c9b77a4f9261553e26017

    SHA512

    b898603d07a49237e4dfc6872d5caa7616bae1258926f10e66c4d3f0d81cccefac1e844395b65bb1f308fbc022061b52e51f60658d0a546c04b365b3428cc87d

  • memory/2408-0-0x0000000000270000-0x00000000002B2000-memory.dmp

    Filesize

    264KB

  • memory/2408-11-0x0000000076940000-0x0000000076A50000-memory.dmp

    Filesize

    1.1MB

  • memory/2408-10-0x0000000076955000-0x0000000076956000-memory.dmp

    Filesize

    4KB

  • memory/2408-13-0x0000000000270000-0x00000000002B2000-memory.dmp

    Filesize

    264KB

  • memory/2408-14-0x0000000076940000-0x0000000076A50000-memory.dmp

    Filesize

    1.1MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.