Analysis

  • max time kernel
    141s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/07/2024, 14:32

General

  • Target

    6ffa7f9a6a36a4ed1751333cfe5f481a_JaffaCakes118.dll

  • Size

    98KB

  • MD5

    6ffa7f9a6a36a4ed1751333cfe5f481a

  • SHA1

    1548d854379389042487686a42c14db220648edd

  • SHA256

    077d73e587aca1c2e439b4019abbab1350c7cf8490e3f8acf633804939e89b9d

  • SHA512

    64f6a25c38b6d0d8bed20756708fbcf51ab927339a87239c142a0b7a22d386743d39033aaa56106f286f3f2dffa7a52847b45e491895d51b8c17606421f2f4c0

  • SSDEEP

    1536:8L2qVSc+E6aVunMCNZ7wA6o68Zitzzz4dJbr5sXfYt:W2Jnh0kMeZ36/8Ccxr5sP6

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6ffa7f9a6a36a4ed1751333cfe5f481a_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3696
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\6ffa7f9a6a36a4ed1751333cfe5f481a_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1000

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads