Analysis

  • max time kernel
    139s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-08-2024 18:27

General

  • Target

    872b4ad39a51fcdbb3ad334fa1eaa483_JaffaCakes118.dll

  • Size

    22KB

  • MD5

    872b4ad39a51fcdbb3ad334fa1eaa483

  • SHA1

    bc7764601cb850f5e17b83f85c64d503a139db47

  • SHA256

    47159ab2ad1659d270f02fab293ec139c1a0a9f81c32c9d434f2a66c6406f219

  • SHA512

    6ae9b19676f7ed3edf37f28a9fb23983afcb7261336b47c65b30d80dfd3c10afcea728a6f12bb9be4a1d6f0b4a0dcc179db6916401331ba60d834e3eb2f9b00d

  • SSDEEP

    384:qOHiWO48f+Z8N8p/ij7m+1Is9giJ4+QoHj20+HR4iol8n95tP1lnwKoos4yrJCzM:DU4hZ1p/ija+1IGpYA6rxGWVnwKsFFiK

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\872b4ad39a51fcdbb3ad334fa1eaa483_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5012
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\872b4ad39a51fcdbb3ad334fa1eaa483_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads