Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 02:25

General

  • Target

    69719bd17f3176df8ddbb3d74508e64f_JaffaCakes118.dll

  • Size

    60KB

  • MD5

    69719bd17f3176df8ddbb3d74508e64f

  • SHA1

    d543faaf136eb92189b993180d5e96d9edd15189

  • SHA256

    4396ee81e77359c384e3741522534737f25322478adc53d08ef84ffaa99ea8b7

  • SHA512

    2218292424f88866962f5e21cbe4d24edd237887db25f59a2d462d2133d70fa4d5b098658215dfaa0913e61c7d847894a22df05773fdc59d7a4c17ab550c553f

  • SSDEEP

    1536:iNnPVLf+YrbT+NTbx0g6vvIZkmauzh2His:iNwoCbxpCI+Ah

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\69719bd17f3176df8ddbb3d74508e64f_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\69719bd17f3176df8ddbb3d74508e64f_JaffaCakes118.dll,#1
      2⤵
        PID:2168

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2168-4-0x000000001002E000-0x000000001002F000-memory.dmp

      Filesize

      4KB

    • memory/2168-3-0x0000000010000000-0x000000001002F000-memory.dmp

      Filesize

      188KB

    • memory/2168-6-0x0000000010000000-0x000000001002F000-memory.dmp

      Filesize

      188KB

    • memory/2168-2-0x0000000010000000-0x000000001002F000-memory.dmp

      Filesize

      188KB

    • memory/2168-1-0x0000000010000000-0x000000001002F000-memory.dmp

      Filesize

      188KB

    • memory/2168-0-0x0000000010000000-0x000000001002F000-memory.dmp

      Filesize

      188KB