Analysis

  • max time kernel
    15s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    13/08/2024, 17:33

General

  • Target

    940faa738a15bedcb2a95c6582e2bffb_JaffaCakes118.dll

  • Size

    91KB

  • MD5

    940faa738a15bedcb2a95c6582e2bffb

  • SHA1

    b375b92b1080f298787f77f3b9e0fd96c7b23fe3

  • SHA256

    e733f3e114a4ffa7d624605b8a0c9a06ba76171f9d7d7887aaeefad601babed8

  • SHA512

    b2e033a4b12ff23bd2dc29d29dac75a3b74f12458b237f0efa4eee83087213aa3397de54cc84a96d32b924572b25345bab7c36b185a9440a183867f3de0b3909

  • SSDEEP

    1536:KP9XQ3JawGfOcnJuWTiNz4BjucXrEjBV:O9mAwFWJusu0ByBV

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\940faa738a15bedcb2a95c6582e2bffb_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\940faa738a15bedcb2a95c6582e2bffb_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2160

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads