Analysis

  • max time kernel
    11s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    12/08/2024, 12:12

General

  • Target

    8eb2bc5d54e01520c0fc8e51d795f6a3_JaffaCakes118.dll

  • Size

    86KB

  • MD5

    8eb2bc5d54e01520c0fc8e51d795f6a3

  • SHA1

    b5abecd68e5e8f6b380c1f24a324bc824965822e

  • SHA256

    2e35c97b3f98b3f5b18b6346973b2aced633cfb5b6b6c322400b1c6e5881f92b

  • SHA512

    fff79ad9a3bbc771fb58a9bf1ebec5fe31fce0fc986044656f3c7e0419b6c43055b537279ab3ac6c6ae4fcf50aa0c58fe9995801ff1652ea3fda16866cc10122

  • SSDEEP

    1536:WnKzAZzBA7pM1Un1PLEy4nYqOHkL21hWklyZXa/DR8:vjYOzhWDZKbC

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8eb2bc5d54e01520c0fc8e51d795f6a3_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\8eb2bc5d54e01520c0fc8e51d795f6a3_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads