Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    11/08/2024, 16:38

General

  • Target

    8b1fec6a1480f4ddaafae52453649be6_JaffaCakes118.dll

  • Size

    79KB

  • MD5

    8b1fec6a1480f4ddaafae52453649be6

  • SHA1

    e3e6421608afb9c92d5c1a8162f081058e374e34

  • SHA256

    0fd59850dc13ec4572dc45501ac0aff33a4faa8676309031e606ddf1c2b9f3d6

  • SHA512

    aa4c57bb55a3240546b805a04131f584b87d36982441995bc94c311d1af2c2ca748cfc781249601550c64263c12da759fe4801983bf28d3d86339042c5b3e800

  • SSDEEP

    1536:T7MYloVC9UD1TZCSvIY+uyc8lO2SpBDhLGI14xA3jzqJAZP7tj4znKWtZe3t:U44C9GvIYdyc6OpjGa4x7yp4znKWe3t

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8b1fec6a1480f4ddaafae52453649be6_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8b1fec6a1480f4ddaafae52453649be6_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2744

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2744-0-0x0000000010000000-0x0000000010682000-memory.dmp

          Filesize

          6.5MB

        • memory/2744-1-0x0000000010000000-0x0000000010682000-memory.dmp

          Filesize

          6.5MB

        • memory/2744-3-0x0000000010680000-0x0000000010681000-memory.dmp

          Filesize

          4KB

        • memory/2744-2-0x0000000010000000-0x0000000010682000-memory.dmp

          Filesize

          6.5MB