Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 07:08

General

  • Target

    730ce09264478861b697a2a6c7bc0723_JaffaCakes118.dll

  • Size

    200KB

  • MD5

    730ce09264478861b697a2a6c7bc0723

  • SHA1

    18ae15bd51f7bd908a59c8a5903f19c81427ddd8

  • SHA256

    a5c49927044f8079843be75055f4d4e6d40431da1819f3b59b35632b3dff25e9

  • SHA512

    c09c22c8bb20ec3664c1ee6af08be43be7ce8a6a17fa99b715c84e50716d6f7e1c5465717bdae49c791267ec36e2c084d73454c9c75ece69fd294a50dd9177a5

  • SSDEEP

    3072:Md+CJ0KJSiY7I0SooSnjpIhjPeDalgxt6J5anwDqKfrf+OEX0u/Dku:I+WYJtoSnjpIhDeen6P

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\730ce09264478861b697a2a6c7bc0723_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\730ce09264478861b697a2a6c7bc0723_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads