Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/07/2024, 02:04

General

  • Target

    69da850d78831db26ae0a094689d78fc_JaffaCakes118.dll

  • Size

    106KB

  • MD5

    69da850d78831db26ae0a094689d78fc

  • SHA1

    7e2346897641378af30e2b59420b748592f8d970

  • SHA256

    47f34914e79aa7bf08717dcf3725dd196e7f62862e1a25d49cce4400a118f131

  • SHA512

    062d4f05ecd15b577fb2226dca4dd88e023ede8e5509a1c3e834d24a67ef471654d54e087fcf47634baae246ced3ab8ae647f960a46b428735f9daae3600a299

  • SSDEEP

    1536:TB7oOZNCnlxNxfsE/Vc97DH3wlRkKcCkJ+XVx0oY1942qUqgYqWvRo:T3CrNxfsE9WTKkj+hL2qU9YqWp

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\69da850d78831db26ae0a094689d78fc_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\69da850d78831db26ae0a094689d78fc_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2772-0-0x00000000000D0000-0x00000000000F0000-memory.dmp

    Filesize

    128KB