Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 20:56

General

  • Target

    a41ea92d12fb28303a73a49f92108e1e_JaffaCakes118.dll

  • Size

    46KB

  • MD5

    a41ea92d12fb28303a73a49f92108e1e

  • SHA1

    8c2c98d462469097ceba9af455aba8b3f61ed591

  • SHA256

    4b2eb561dc90b1668476441cb21c97a60736110f93aecfd11442f73e53bc5e98

  • SHA512

    99bb17b989ec7ae62fac31408a26d65064620a9e323075f2e74d0cd65773250f73d1123b154419e429e25372fd7a1503eb776bd4513331c35b9ba295b55c1a62

  • SSDEEP

    768:dcfycg6B3CQ6BLaSs1uQbcUagrhGbvJ2uHS2PAetJ1a7MfoblKp+qZH4UE/wxEhq:2ffNB35ULaSs1uqcUHr4J2auK/h

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a41ea92d12fb28303a73a49f92108e1e_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a41ea92d12fb28303a73a49f92108e1e_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads