Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    12-08-2024 07:54

General

  • Target

    8ded4024e63fd5b36262b03fea8a8618_JaffaCakes118.dll

  • Size

    100KB

  • MD5

    8ded4024e63fd5b36262b03fea8a8618

  • SHA1

    9472132f37dd35f9661c6d80a7e5eb3dd0d4147c

  • SHA256

    7f5155bab16f135d806530bb85e82c2d9ec15a9d8b45fc17064254f5cecc33c8

  • SHA512

    92f7d1ca251e278d1e49193d3f80186b712f672aa6d8e38f36996e82527e7c2388be2017a628f6c523a2d76c1bf56c8b834a48470bcc775a82e06186ec0382eb

  • SSDEEP

    3072:/JfNzlU5+KtRmaQkUVaQL3rct+2rFGjaAHi0xnN:/JfJER/QsQDrTqGGAzd

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8ded4024e63fd5b36262b03fea8a8618_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8ded4024e63fd5b36262b03fea8a8618_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2344

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2344-1-0x0000000010000000-0x000000001001A000-memory.dmp

    Filesize

    104KB

  • memory/2344-0-0x0000000010000000-0x000000001001A000-memory.dmp

    Filesize

    104KB