Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/08/2024, 23:14

General

  • Target

    821c1e9f307315a353ea5bf6483a0f49_JaffaCakes118.dll

  • Size

    200KB

  • MD5

    821c1e9f307315a353ea5bf6483a0f49

  • SHA1

    083fa09738ed5aab6f2db2e52de851e3af89e1e9

  • SHA256

    64626d3d7b4a684b3bf7d44834343ddc09fa6c52e64fb6c14af69bf820f0d9ad

  • SHA512

    825b41e4eb5ac7a996be0547a5f145d6463ccf0ba4eaec7ae421b6ac14fc247e585b61f128c70bfdfb322d5ed6adec2abac0ce750bd5f7d9a9debc05ae56bb02

  • SSDEEP

    1536:qVwGmwhMIu7JFh3CKWB5JwRda16F3FsEEuKop21MbcPoa1RdKuoTRlbFTkrFhoim:qqG/u7T9CKWBQRORAbdQ/oFN4m

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\821c1e9f307315a353ea5bf6483a0f49_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\821c1e9f307315a353ea5bf6483a0f49_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads