Analysis

  • max time kernel
    138s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-08-2024 02:14

General

  • Target

    889988eafcd86a616b805970abb5fb54_JaffaCakes118.dll

  • Size

    90KB

  • MD5

    889988eafcd86a616b805970abb5fb54

  • SHA1

    0947b3fc9a57ed6b24ff90295e2b38c8322bfa19

  • SHA256

    ac7e1e62e4b565b3047b83e13f3183ff5cadabc18dac9ca2daa5ea7645e006ce

  • SHA512

    c22ad5ccddbda6da76c497024dea63148d763e1729ae173980c00418fbed6fbd998fa072061dd8d13f20862221b23c546cdcb463735ec9200c5aa386cf1301fb

  • SSDEEP

    1536:qRV7LsgnnSTJmKAgV6RF3oXEqaeuPhV+YSsDRh/wB01oMqaac4SIaNbu:a7AgnnGmNv3oXi3V+YJDRh/wrcBL

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\889988eafcd86a616b805970abb5fb54_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\889988eafcd86a616b805970abb5fb54_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4600

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4600-0-0x0000000010000000-0x000000001002A000-memory.dmp

    Filesize

    168KB

  • memory/4600-1-0x0000000010000000-0x0000000010025000-memory.dmp

    Filesize

    148KB

  • memory/4600-2-0x0000000010000000-0x000000001002A000-memory.dmp

    Filesize

    168KB

  • memory/4600-3-0x0000000010000000-0x0000000010025000-memory.dmp

    Filesize

    148KB