Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    01-08-2024 21:31

General

  • Target

    81cc16ea7143e2e26d8aa040765fe083_JaffaCakes118.dll

  • Size

    121KB

  • MD5

    81cc16ea7143e2e26d8aa040765fe083

  • SHA1

    493445df9f382d24db9ca1ea0780967d63830b49

  • SHA256

    009f2f72eb398efba8568515b191e56cfa13f4b93760f2215cfe706e85423575

  • SHA512

    4346e6d1d96eac3c13fcb0356905037b5e5517434f14d760b78ca7dfe82565e666bbe0e7d8a1b57141ad34b805595cc340a4c63c7d76b6d67f12d364f4b91841

  • SSDEEP

    3072:CM6aDMCerVgL0LDhZonurACDU5bY7R71/Er1Ob9dH22C67HF+7SaIeVxJMdCJZAH:CMjQZO4NKn6U5wx1cr0b9dW2FHF+7v7g

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\81cc16ea7143e2e26d8aa040765fe083_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\81cc16ea7143e2e26d8aa040765fe083_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1516-0-0x0000000000C90000-0x0000000000D98000-memory.dmp

    Filesize

    1.0MB