Analysis

  • max time kernel
    140s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 15:42

General

  • Target

    8af288d117e02bd7e8558cf00ad9cfc8_JaffaCakes118.dll

  • Size

    30KB

  • MD5

    8af288d117e02bd7e8558cf00ad9cfc8

  • SHA1

    f535fd2ade218009843318ea1a8991ef97c1be7c

  • SHA256

    ef6122bc0520b891844ed98c5811be1a259f37f565c8fe1e26c04fa4d32da51b

  • SHA512

    60aa5d3a70c83c8a48cf0a58e255920e22c4976754c8e728cd4aaa7eee0f3f3b3d92e968a7d49f28de9334e8fb337794ff820fe3a1e559808b02f7f459dc8c81

  • SSDEEP

    768:MKS0quk80GQIoQfYfJe02wWh7jkU7klnwiwBv:k0quk80GQRVfKNoU7+wf

Score
3/10

Malware Config

Signatures

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8af288d117e02bd7e8558cf00ad9cfc8_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1140
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8af288d117e02bd7e8558cf00ad9cfc8_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 896 -s 228
        3⤵
        • Program crash
        PID:2608

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/896-0-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB