Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 17:35

General

  • Target

    06c0e14742ffe22e9b4f4ef330ac18e1_JaffaCakes118.dll

  • Size

    95KB

  • MD5

    06c0e14742ffe22e9b4f4ef330ac18e1

  • SHA1

    b054a87677302da065fb6d62e74902723b01fdb4

  • SHA256

    dfa397861600e87386b06f0178ffe6abae4c356c10420bbd13c64a3c78a23266

  • SHA512

    f5d659d3e2a2dd1586e6be0aae72ac3aedde3a4d4e760324056dd8a2348c07d5717a256ba1e423a0a94195a63e31a1127cf612b1bcd1b37015cb2a11ea1d5c33

  • SSDEEP

    1536:WtxOpabjbENiPHlhJM33DDUFgRdifCNNmbwc6PDCvbR0npOIcySR4sRz1o+yBpET:WtBXzm3DDUSRIsaMDCtcnVg9RzO/KT

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies registry class 39 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\06c0e14742ffe22e9b4f4ef330ac18e1_JaffaCakes118.dll
    1⤵
    • Modifies registry class
    PID:1152

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1152-0-0x000007FEFA570000-0x000007FEFA5DD000-memory.dmp

          Filesize

          436KB