Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/01/2025, 09:02 UTC

General

  • Target

    JaffaCakes118_e267d44d777a895484903cf102497947.dll

  • Size

    231KB

  • MD5

    e267d44d777a895484903cf102497947

  • SHA1

    8f0f2060345ab4c133f928d334e4d6efca1211c6

  • SHA256

    14a3bed2f9d5bb9d0b903cdbe9e621951b810d2de98da758b1ff2dd496397ef9

  • SHA512

    8b4b0287ebc10d6082da4075ce6da14ac3e751f3e34300d81410732a3ff617ee616e6e3f5ab1d38498863b236fa2b89e300b7a58a3a3217f167e3850a0a32209

  • SSDEEP

    3072:zysX0WxnWd/IkmL+PViEbmzwtz/wk8YWbP:mskd/IkmuVfyWdMP

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e267d44d777a895484903cf102497947.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e267d44d777a895484903cf102497947.dll,#1
      2⤵
      • Adds autorun key to be loaded by Explorer.exe on startup
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\lpmsb.dll

    Filesize

    625KB

    MD5

    95e2376b3323f062eb562b8586d0f14a

    SHA1

    453d4c3bf4a489433b593420a37bbffb7749875a

    SHA256

    bd3fa8750123d00aa0967fba44372c46ea002681da9c9b77a4f9261553e26017

    SHA512

    b898603d07a49237e4dfc6872d5caa7616bae1258926f10e66c4d3f0d81cccefac1e844395b65bb1f308fbc022061b52e51f60658d0a546c04b365b3428cc87d

  • memory/2140-0-0x00000000001B0000-0x00000000001F3000-memory.dmp

    Filesize

    268KB

  • memory/2140-1-0x00000000001B1000-0x00000000001B8000-memory.dmp

    Filesize

    28KB

  • memory/2140-7-0x00000000001B0000-0x00000000001F3000-memory.dmp

    Filesize

    268KB

  • memory/2140-10-0x00000000001B0000-0x00000000001F3000-memory.dmp

    Filesize

    268KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.