Analysis

  • max time kernel
    95s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2024, 05:40

General

  • Target

    0e2e40454688ab1865a01bc55e4f5bf9_JaffaCakes118.dll

  • Size

    634KB

  • MD5

    0e2e40454688ab1865a01bc55e4f5bf9

  • SHA1

    ffa0d7599111fe95d99bdc6cbb405182aa99f5c9

  • SHA256

    791efa2385d0f5ecaafc54b91dcc1ba2a49d190ee0fae6de7ee3f1ba881828b6

  • SHA512

    055fc9c5b656f5f9543320b14df0658ce6c7f12c81c8353b5990710c358d559cfe0efdb20a6bac951308d445bb9d45e5ae5e01a28a9b283b1433e697a116006e

  • SSDEEP

    12288:WM0t9FNcxDMmfrLAF8rZIRf2MmsXa0wy8Jhk/fO79s:+tjNcXnVInvallhk

Malware Config

Signatures

  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 11 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\0e2e40454688ab1865a01bc55e4f5bf9_JaffaCakes118.dll
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Windows\SysWOW64\regsvr32.exe
      /s C:\Users\Admin\AppData\Local\Temp\0e2e40454688ab1865a01bc55e4f5bf9_JaffaCakes118.dll
      2⤵
      • Installs/modifies Browser Helper Object
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:3184

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads