Analysis

  • max time kernel
    139s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/08/2024, 22:22

General

  • Target

    87e807135abfeab4a191e4a17188f7f4_JaffaCakes118.dll

  • Size

    116KB

  • MD5

    87e807135abfeab4a191e4a17188f7f4

  • SHA1

    226e74bbd2572795f8783ad65a7960f82a3dd85b

  • SHA256

    4385e95106cf2448ca59d1b3aad41e99f5fa0735ad0fb82954f84a903bf0f465

  • SHA512

    107801065f131040b0f0a307c0a14a5a33ffdf6bc5116efbf3a439302aec2271e1b4af6362d8840ce6e35d5b8cdba18cca1eede640ec0b59c73c67bae2ffa44d

  • SSDEEP

    1536:ZSt53x9CP8D0OmEXPnoT/gcm6qpPz+VTowRkxuKwG05lKMqqU+NV23S2VuqJFB:khDKYMuzConuKwGGlKMqqDLy/ocB

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\87e807135abfeab4a191e4a17188f7f4_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\87e807135abfeab4a191e4a17188f7f4_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1288

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1288-0-0x0000000000EE0000-0x0000000000EEA000-memory.dmp

          Filesize

          40KB

        • memory/1288-4-0x0000000010017000-0x0000000010026000-memory.dmp

          Filesize

          60KB