Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    18/08/2024, 03:02

General

  • Target

    a52245d5ae71d6f6757d53d4f25d7d2b_JaffaCakes118.dll

  • Size

    5KB

  • MD5

    a52245d5ae71d6f6757d53d4f25d7d2b

  • SHA1

    bfcbc7be394d5861252f1a920ada7c79cd92feef

  • SHA256

    1412e9da640609f10ecc0a01dfe0a81760d730bfb2f9304a806bd287221978ed

  • SHA512

    cef49180325ad8fd60f392c6ebda715e305d68b6298f297d65d5599e586c01f53baf9caf35d9d84242c597c52a18cdeedc53bdd46e0546eec3ad64cc24fde0e0

  • SSDEEP

    96:RxDi6iiGIaXowjJj8KE7milmQ1k6GsvvV0DB5UVMecBgAtWjBH:Rx+a1eSK+VSDcmFFtWd

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a52245d5ae71d6f6757d53d4f25d7d2b_JaffaCakes118.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1872
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\a52245d5ae71d6f6757d53d4f25d7d2b_JaffaCakes118.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2144

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads