Analysis

  • max time kernel
    69s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/08/2024, 22:16

General

  • Target

    a0252d02d3274c5ae215900c7f965ca1_JaffaCakes118.dll

  • Size

    89KB

  • MD5

    a0252d02d3274c5ae215900c7f965ca1

  • SHA1

    d9e47939809bc4886a41d34af58108bc2bc2a1a6

  • SHA256

    85b975a1e636acc1388cd681e25dc6ee4a4ce3cd967db404b2fe40716d0e70bd

  • SHA512

    b7e6b48f4fe4ea6d71f9ed9c217bf6835eeb9d63ca08116f3d0aa1477f387f8f7b0885c1eb17e8cdf8b32f4bd7ff01c2219d36fff62526b5537e98058ed43e0f

  • SSDEEP

    1536:EPjZQ3xawGfOcnJrn8tRz4BjucXrbHs9F6Ac:sj8IwFWJr8L0Bds9F6Ac

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a0252d02d3274c5ae215900c7f965ca1_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3248
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a0252d02d3274c5ae215900c7f965ca1_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2924

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads