Analysis

  • max time kernel
    140s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2024 09:25

General

  • Target

    a202452deb98ef5a504bd1470b8161b0_JaffaCakes118.dll

  • Size

    139KB

  • MD5

    a202452deb98ef5a504bd1470b8161b0

  • SHA1

    563c71c5e81ec8219f5c166d774962f5930aae70

  • SHA256

    e8f131a2b5fed9b875d1b4013d62eedbc5cb480ece60e66daa1b035be07c4bb4

  • SHA512

    e87a34bab025a747181fa2a07406362fcd0705f5f674f59533c96f7f6018e7b7e518449ae50df0a002c5031a0c257caaacf5647dfbcb9108675b7ef89adfe504

  • SSDEEP

    3072:3NCHs63XxtEyLTrl/uuIIPhvpE6cXjA8iVUAWGaqqqBSpXuWMfujoMITjWp:dCJHQyJ/u/EFpkXsDePGaqqqBmMfujP5

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a202452deb98ef5a504bd1470b8161b0_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:228
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a202452deb98ef5a504bd1470b8161b0_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2352-0-0x0000000067580000-0x00000000675A9000-memory.dmp

    Filesize

    164KB